www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary.pt-br.html po/de.po...


From: GNUN
Subject: www/proprietary proprietary.pt-br.html po/de.po...
Date: Fri, 16 Oct 2020 07:32:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/10/16 07:32:31

Modified files:
        proprietary    : proprietary.pt-br.html 
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.215&r2=1.216
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.541&r2=1.542
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.633&r2=1.634
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.324&r2=1.325
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.365&r2=1.366
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.400&r2=1.401
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.478&r2=1.479
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.216&r2=1.217

Patches:
Index: proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.pt-br.html      11 Oct 2020 17:28:42 -0000      1.86
+++ proprietary.pt-br.html      16 Oct 2020 11:32:28 -0000      1.87
@@ -3,7 +3,7 @@
  https://www.gnu.org/proprietary/po/proprietary.pt-br.po</a>'
  --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary.html"
  --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary.pt-br-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2020-08-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2020-08-12" -->
 
 <!--#include virtual="/server/html5-header.pt-br.html" -->
 <!-- Parent-Version: 1.86 -->
@@ -319,7 +319,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/10/11 17:28:42 $
+$Date: 2020/10/16 11:32:28 $
 
 <!-- timestamp end -->
 </p>

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/de.po    7 Oct 2020 17:02:19 -0000       1.216
+++ po/de.po    16 Oct 2020 11:32:28 -0000      1.217
@@ -12252,6 +12252,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# | 
href=\"/philosophy/words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>.-]
+# | {+word &ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean
+# | &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">„monetarisieren“</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -12267,14 +12295,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -12331,6 +12351,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- po/es.po    7 Oct 2020 17:02:19 -0000       1.310
+++ po/es.po    16 Oct 2020 11:32:28 -0000      1.311
@@ -12159,6 +12159,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
+"philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -12183,28 +12211,6 @@
 "accused-watching-Instagram-users-mobile-cameras.html\">espía a los usuarios "
 "de Instagram</a> activando a escondidas la cámara del dispositivo."
 
-#. type: Content of: <div><ul><li><p>
-# | Oc[-c-]ulus headsets <a
-# | 
href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\";>require
-# | users to identify themselves to Facebook</a>. This will give Facebook free
-# | rein to pervasively snoop on Oc[-c-]ulus users.
-#, fuzzy
-#| msgid ""
-#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
-#| "\">require users to identify themselves to Facebook</a>. This will give "
-#| "Facebook free rein to pervasively snoop on Occulus users."
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Los cascos Occulus<a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">exigen a los usuarios identificarse en Facebook</a>. Esto da a Facebook "
-"plena capacidad para espiar en todo momento a los usuarios de Occulus."
-
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -12273,6 +12279,28 @@
 "tales situaciones."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Oc[-c-]ulus headsets <a
+# | 
href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\";>require
+# | users to identify themselves to Facebook</a>. This will give Facebook free
+# | rein to pervasively snoop on Oc[-c-]ulus users.
+#, fuzzy
+#| msgid ""
+#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#| "\">require users to identify themselves to Facebook</a>. This will give "
+#| "Facebook free rein to pervasively snoop on Occulus users."
+msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Los cascos Occulus<a href=\"https://www.theverge.com/2020/8/18/21372435/";
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">exigen a los usuarios identificarse en Facebook</a>. Esto da a Facebook "
+"plena capacidad para espiar en todo momento a los usuarios de Occulus."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- po/fr.po    7 Oct 2020 20:00:19 -0000       1.382
+++ po/fr.po    16 Oct 2020 11:32:28 -0000      1.383
@@ -10695,6 +10695,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Notez que cet article emploie à mauvais escient l'expression "
+"<cite><a href=\"/philosophy/free-sw.html\">free software</a></cite> dans le "
+"sens de « logiciel gratuit ».)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -10720,18 +10748,6 @@
 "utilisateurs d'Instagram</a> en activant subrepticement la caméra du "
 "téléphone."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera à "
-"Facebook carte blanche pour les espionner systématiquement."
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -10785,6 +10801,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera à "
+"Facebook carte blanche pour les espionner systématiquement."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/it.po    7 Oct 2020 17:02:19 -0000       1.216
+++ po/it.po    16 Oct 2020 11:32:29 -0000      1.217
@@ -11486,6 +11486,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -11501,14 +11517,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -11567,6 +11575,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/ja.po    7 Oct 2020 17:02:19 -0000       1.224
+++ po/ja.po    16 Oct 2020 11:32:29 -0000      1.225
@@ -8953,6 +8953,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -8968,14 +8984,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -9029,6 +9037,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- po/nl.po    7 Oct 2020 17:02:19 -0000       1.217
+++ po/nl.po    16 Oct 2020 11:32:29 -0000      1.218
@@ -8303,6 +8303,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -8318,14 +8334,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -8383,6 +8391,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/pl.po    7 Oct 2020 17:02:19 -0000       1.216
+++ po/pl.po    16 Oct 2020 11:32:29 -0000      1.217
@@ -7801,6 +7801,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7816,14 +7832,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -7882,6 +7890,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.215
retrieving revision 1.216
diff -u -b -r1.215 -r1.216
--- po/pot      7 Oct 2020 17:02:19 -0000       1.215
+++ po/pot      16 Oct 2020 11:32:29 -0000      1.216
@@ -7129,6 +7129,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7144,14 +7160,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #
 #
 #
@@ -7196,6 +7204,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/proprietary-surveillance.de-diff.html    7 Oct 2020 17:02:20 -0000       
1.130
+++ po/proprietary-surveillance.de-diff.html    16 Oct 2020 11:32:29 -0000      
1.131
@@ -759,86 +759,145 @@
 
   &lt;li id="M201711250"&gt;
     &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
+    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
+      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages returned 
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    &lt;p&gt;In</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>JS injection is</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    to use</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>without having your fingerprints taken. Users would 
have
+    no way to tell whether</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    lots</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>have
+      confirmed</strong></del></span> <span class="inserted"><ins><em>on 
iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
-  &lt;/li&gt;
+    a server every phone number</em></ins></span> that the <span 
class="removed"><del><strong>non-premium version of</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>app does
+      JavaScript injection</strong></del></span>
+    <span class="inserted"><ins><em>server records these 
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and 
display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>at least 
30 days.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
-  &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of</strong></del></span> <span class="inserted"><ins><em>photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+    take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up 
to date on all your devices. Any edits you
+    make</em></ins></span> are <span class="removed"><del><strong>not in 
fact</strong></del></span> <span class="inserted"><ins><em>automatically 
updated everywhere. [&hellip;] &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    &lt;p&gt;(From</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track 
users</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span>
 by
+       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the
     startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way to
-    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
-    surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
+       &lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
-    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;/li&gt;
 
-  &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>default 
so it still counts as a
+    surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>Android apps can collude to transmit users' 
personal
+       data</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+    security to get at them, but NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users 
is</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
+    not <span class="removed"><del><strong>enough</strong></del></span> <span 
class="inserted"><ins><em>as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -846,14 +905,14 @@
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span class="removed"><del><strong>honestly 
identify</strong></del></span>
+    <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all the data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -865,20 +924,27 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
+    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
-    to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;
+    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
+    to it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -888,10 +954,15 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
+    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking at a 
folder,
+    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span class="inserted"><ins><em>a song.  They 
send device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
@@ -937,44 +1008,69 @@
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
+    disable Google Play itself to completely stop the 
tracking.</em></ins></span>  This is
     yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that &lt;a
+  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
+    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
+    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably Windows laptops).  Here 
is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
+    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
+    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+      <span class="removed"><del><strong>send</strong></del></span>
+    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
     listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
@@ -998,14 +1094,24 @@
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
+    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1014,7 +1120,7 @@
   &lt;li id="M201603080"&gt;
     &lt;p&gt;E-books can contain JavaScript code, and &lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
@@ -1035,42 +1141,50 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
     &lt;p&gt;Some Avast and AVG extensions
     for Firefox and Chrome were found to &lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
-    removed the problematic extensions from their stores, but this shows
+    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span class="inserted"><ins><em>Google
+    removed</em></ins></span> the <span class="removed"><del><strong>EU 
Copyright Directive make</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
     once more how unsafe nonfree software can be. Tools that are supposed
-    to protect a proprietary system are, instead, infecting it with
+    to protect a proprietary system are, instead, infecting</em></ins></span> 
it <span class="inserted"><ins><em>with
     additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because</strong></del></span> <span class="inserted"><ins><em>identify who is 
running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    &lt;p&gt;The fact that</em></ins></span> this
+      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for 
repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
     &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1080,45 +1194,62 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
+      obvious way</strong></del></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
     tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does &lt;a
+    &lt;p&gt;The Amazon Ring app</em></ins></span> does <span 
class="removed"><del><strong>turn them off&mdash;only until 5am.
+      That's Apple</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    surveillance</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you 
want</strong></del></span> <span class="inserted"><ins><em>other companies as 
well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
-    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to be <span 
class="removed"><del><strong>spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
     spying tool for the government of the United Arab Emirates&lt;/a&gt;.
     Any nonfree program could be doing this, and that is a good
-    reason to use free software instead.&lt;/p&gt;
+    reason</em></ins></span> to use <span class="removed"><del><strong>it 
without having your fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>free software instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
+    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>phone is</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in
     the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
     &lt;p&gt;iMonsters and Android phones,
     when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;</em></ins></span>
+    snooping <span class="inserted"><ins><em>and sabotage 
capabilities&lt;/a&gt; if they install their own
+    software</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>the device.  Many employers demand</em></ins></span> 
to <span class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother 
can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
     employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    the Great Nation&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
+    internet history&lt;/a&gt;, and the Android version was found to 
contain</em></ins></span> a <span class="removed"><del><strong>server every 
phone number</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
@@ -1126,115 +1257,208 @@
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
+    saying</em></ins></span> that the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android version
     of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users</em></ins></span> even <span 
class="removed"><del><strong>gratis apps)&lt;/a&gt;
+      without</strong></del></span> <span class="inserted"><ins><em>when it is 
turned off&lt;/a&gt;, after tricking them
+    into</em></ins></span> giving <span class="removed"><del><strong>a valid 
email address and receiving</strong></del></span> the <span 
class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>app broad 
permissions in order</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>use one</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS</strong></del></span> <span 
class="inserted"><ins><em>its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some nonfree period-tracking</em></ins></span> apps <span 
class="inserted"><ins><em>including MIA Fem and Maya</em></ins></span> &lt;a 
<span class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>users' lives</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    program</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup</strong></del></span> <span class="inserted"><ins><em>a 
form</em></ins></span> of <span class="removed"><del><strong>iOS&lt;/a&gt;. The 
term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>surveillance.  There</em></ins></span> is a <span 
class="removed"><del><strong>way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span>
+    <span class="inserted"><ins><em>proprietary program for 
adjusting</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown</strong></del></span> <span 
class="inserted"><ins><em>certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of all the 10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
+    A US prosecutor has demanded the list of all the 10,000 or 
more</em></ins></span> people <span class="removed"><del><strong>apparently 
took advantage</strong></del></span>
+    <span class="inserted"><ins><em>who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list of who has installed
+    &lt;p&gt;With a free program there would not be a list</em></ins></span> 
of <span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of the operating system, in order to gather as much private data as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
+    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed to break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>the 
operating system, in order</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>gather as much private data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    &lt;p&gt;Thus, we can't trust rules against spying.  What 
we</em></ins></span> can <span class="removed"><del><strong>access any of them 
through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>trust is
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>software we 
run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>secretly</em></ins></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which 
is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
+      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
     requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
     the event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+    &lt;p&gt;This app is a spyware</em></ins></span> that can <span 
class="removed"><del><strong>be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>snoop on a lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop on all</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+    data <span class="removed"><del><strong>in an iThing,
+      or it</strong></del></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized and aggregated,&rdquo; it can 
easily be
+    traced back</em></ins></span> to <span 
class="removed"><del><strong>exist</strong></del></span> <span 
class="inserted"><ins><em>the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
     and freedom to make their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    free-software app that does more or less</em></ins></span> the
+      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>same thing without
+    spying on you</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new one is being 
developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google</em></ins></span> tracks <span 
class="removed"><del><strong>location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span> the <span class="removed"><del><strong>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Some portable</strong></del></span> <span 
class="inserted"><ins><em>movements of Android</em></ins></span> phones <span 
class="inserted"><ins><em>and iPhones
+    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the</em></ins></span> data <span class="inserted"><ins><em>for 
years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
+    the location data</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have 
access</em></ins></span> to
+    the <span class="removed"><del><strong>microphone, retrieve geo-location 
data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>data.</em></ins></span> This <span 
class="removed"><del><strong>malware</strong></del></span> <span 
class="inserted"><ins><em>results in massive
     surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1245,59 +1469,126 @@
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried in
+    lengthy terms of service that are difficult</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and <span 
class="removed"><del><strong>they send so much</strong></del></span> <span 
class="inserted"><ins><em>released them, apparently not realizing that all the 
personal</em></ins></span>
+    data <span class="inserted"><ins><em>they collected would go to Facebook 
as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>their transmission is</strong></del></span> <span 
class="inserted"><ins><em>no one can trust</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission,</strong></del></span> <span class="inserted"><ins><em>nonfree 
program,</em></ins></span> not <span class="removed"><del><strong>wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>even</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span>
+    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone 
in</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; 
how</em></ins></span> Android
+      <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>apps use</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>hardware 
identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>to restrict
+      the use</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but</strong></del></span>
+    <span class="inserted"><ins><em>Google's policies. But</em></ins></span> 
it <span class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list</strong></del></span> <span 
class="inserted"><ins><em>seems that Google wasn't aware</em></ins></span> of 
<span class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it,
+    and, once informed, was</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going</strong></del></span> <span 
class="inserted"><ins><em>no hurry</em></ins></span> to <span 
class="inserted"><ins><em>take action. This proves
+    that the policies of</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
     preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="removed"><del><strong>can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span> <span 
class="inserted"><ins><em>have a surveillance feature for</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording</em></ins></span> all <span class="removed"><del><strong>phone 
numbers and email addresses&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>the users' actions&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>user's address
+      book to developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>interacting 
with</em></ins></span> the <span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>or 
watching&lt;/a&gt;. In addition, it may</strong></del></span>
+    be <span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>on Google 
Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+    them</em></ins></span> to <span 
class="removed"><del><strong>serve</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
+    the user interface of most of</em></ins></span> them <span 
class="removed"><del><strong>with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
+
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>was designed</em></ins></span> to <span 
class="removed"><del><strong>do lots</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    &lt;p&gt;Users should</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by</strong></del></span> 
<span class="inserted"><ins><em>course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
@@ -1305,32 +1596,44 @@
 
   &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to <span class="removed"><del><strong>personal 
data</strong></del></span> <span class="inserted"><ins><em>protect their 
users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
     source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span> <span class="inserted"><ins><em>top 
10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
+    &lt;p&gt;The Weather Channel</em></ins></span> app <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
+    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>notify the users</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app</strong></del></span> <span 
class="inserted"><ins><em>what it</em></ins></span> will <span 
class="removed"><del><strong>give Verizon</strong></del></span> <span 
class="inserted"><ins><em>do
+    with</em></ins></span> the <span class="removed"><del><strong>same
+   information</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is</em></ins></span> about <span 
class="inserted"><ins><em>a side issue. What</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>data is a secondary issue. The principal wrong 
here</em></ins></span> is <span class="inserted"><ins><em>that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -1340,73 +1643,141 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;, and</strong></del></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    Facebook</em></ins></span> can <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>correlate</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server 
accounts,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>same 
machine via
+    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the user's <span class="removed"><del><strong>consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>activities in the app; others only say that the 
user</em></ins></span> is <span class="removed"><del><strong>inadequate 
as</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user 
has</em></ins></span> a <span class="removed"><del><strong>protection against 
massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what radio and TV programs</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on 
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn 
off the other kinds of location
+    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming</em></ins></span> app &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>picture</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If</em></ins></span> you <span class="removed"><del><strong>take 
according</strong></del></span> <span 
class="inserted"><ins><em>learn</em></ins></span> to <span 
class="removed"><del><strong>who
+      is</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit</em></ins></span> in
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+    of</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users' 
pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and</em></ins></span> the proprietary <span 
class="removed"><del><strong>software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>by 
getting</em></ins></span> apps <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>free 
software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>at 
least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
@@ -1575,7 +1946,7 @@
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read</em></ins></span> logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
@@ -1586,57 +1957,14 @@
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display ads. Uses
-      roughly <span class="removed"><del><strong>5</strong></del></span> <span 
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it 
redirects the user's
+      roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5 tracking libraries. Developers of this app 
have
-      confirmed that the non-premium version of the app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable</strong></del></span>
-      <span class="inserted"><ins><em>five</em></ins></span> tracking <span 
class="removed"><del><strong>libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span> <span 
class="inserted"><ins><em>libraries. Developers of this</em></ins></span> app 
<span class="removed"><del><strong>developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>have confirmed that</em></ins></span>
-      the <span class="removed"><del><strong>personal 
details</strong></del></span> <span class="inserted"><ins><em>non-premium 
version</em></ins></span> of <span class="removed"><del><strong>users that 
install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
-      tracking</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>user and displaying 
ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -1650,67 +1978,43 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to 
who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
-    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>require 
online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
-what they</strong></del></span> <span 
class="inserted"><ins><em>pictures</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>likely to be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
+    and suggests you to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
-    even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them</em></ins></span> 
with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
+  &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
+    spy on many sorts of data in the phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>TV programs
-    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>post 
on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apps that include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
-    &lt;p&gt;&ldquo;Cryptic</em></ins></span> communication,&rdquo;
+  &lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
@@ -1719,7 +2023,7 @@
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article <span 
class="removed"><del><strong>takes</strong></del></span> <span 
class="inserted"><ins><em>takes for granted that the usual analytics tools are
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
     legitimate, but is that valid? Software developers have no right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
@@ -1759,355 +2063,182 @@
     &lt;p&gt;The article confusingly describes gratis apps as
     &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>granted</strong></del></span> that <span 
class="removed"><del><strong>the usual analytics tools are
-  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
-    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;</em></ins></span>
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
+  &lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
     and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201504060"&gt;
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li id="M201411260"&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401150.1"&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312270"&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use of data on the user's computer, but it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get the user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
+  &lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+    &lt;p&gt;The FTC criticized this app because it asked the user to
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    surveillance: why should a flashlight app send any information to
+    anyone? A free software flashlight app would not.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  &lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201908151"&gt;
+    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    on calls&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
-      obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;li id="M201307110"&gt;
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    Microsoft changed Skype &lt;a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
   
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This</em></ins></span> is <span 
class="inserted"><ins><em>in addition to
-    the</em></ins></span> snooping <span class="removed"><del><strong>on
-      them.&lt;/p&gt;&lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span class="inserted"><ins><em>done by the 
phone company, and perhaps by the OS in
-    the phone.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
+    
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can</strong></del></span> <span class="inserted"><ins><em>whether the 
app developers</em></ins></span>
-    get <span class="removed"><del><strong>them from 
there.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users to 
say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
-    &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in</em></ins></span> a <span 
class="removed"><del><strong>server every phone number</strong></del></span> 
<span class="inserted"><ins><em>way</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers for</strong></del></span> at least <span 
class="removed"><del><strong>30
-        days.&lt;/p&gt;
+  &lt;li id="M201806240"&gt;
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>is visible</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
-    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version</em></ins></span> of 
<span class="removed"><del><strong>the most popular iOS 
apps</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>restrict</em></ins></span> the <span 
class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span class="inserted"><ins><em>use of data</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>user's computer, 
but</em></ins></span> it <span class="removed"><del><strong>still counts as 
a</strong></del></span> <span class="inserted"><ins><em>does</em></ins></span> 
surveillance <span class="removed"><del><strong>functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>too:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries</em></ins></span> to get <span class="removed"><del><strong>at 
them, but NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing is,
-      and get</strong></del></span> <span class="inserted"><ins><em>user's 
list of</em></ins></span> other <span class="removed"><del><strong>info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people's 
phone
-    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span> <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer</em></ins></span> but 
<span class="inserted"><ins><em>did not ask
-    about sending</em></ins></span> it
-      <span class="removed"><del><strong>is still true in iOS 
7.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>to other 
companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app would 
not.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
-    on <span class="removed"><del><strong>all the data in an iThing,
-      or</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly means</em></ins></span> it <span 
class="removed"><del><strong>is totally 
incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can do so.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
-    Microsoft changed Skype &lt;a
-    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is 
pervasive</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location for Google</strong></del></span> 
<span class="inserted"><ins><em>had</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>phone has</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Morally, we see</em></ins></span> no <span 
class="removed"><del><strong>SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with</strong></del></span> <span 
class="inserted"><ins><em>difference between having human workers listen and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is a</em></ins></span> spyware <span 
class="removed"><del><strong>sending lots of</strong></del></span> <span 
class="inserted"><ins><em>that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804144"&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>the massive
-    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>turn the 
phones</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201804144"&gt;
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
     
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information</em></ins></span> to <span class="removed"><del><strong>the 
microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
-    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>merge 
the data
-    collected by various cr&hellip;apps</em></ins></span> and <span 
class="removed"><del><strong>they send so much</strong></del></span> <span 
class="inserted"><ins><em>sites made by different
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>to manipulate people to buy things, and 
hunt</em></ins></span> for <span class="removed"><del><strong>users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute 
spying</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;whales&rdquo; who can be led to 
spend a lot</em></ins></span> of <span class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span> <span class="inserted"><ins><em>money. 
They also
-    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span> <span class="inserted"><ins><em>cost 
money</em></ins></span>
-    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+  &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on
-      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
-    have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
+    spies on every process running on a gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -2125,102 +2256,63 @@
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
-before <span class="removed"><del><strong>and after 
going</strong></del></span> <span class="inserted"><ins><em>Amazon 
&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
-    every <span 
class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>second of what the user is watching&lt;/a&gt;. 
This is illegal due to
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
     the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;</em></ins></span>
+    it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+  &lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
     collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO,</em></ins></span> and <span class="removed"><del><strong>email 
addresses&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
data is sold to third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book</strong></del></span> <span class="inserted"><ins><em>return for
+    CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note 
that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>spying 
acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>him,
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
     is that it is opt-in in newer models. But since the Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
-    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which 
can</em></ins></span>
-    be <span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>an old 
computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>serve 
them</strong></del></span> <span class="inserted"><ins><em>block connections to 
Vizio's servers. Or, as a last resort,
-    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;</em></ins></span>
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span class="removed"><del><strong>its 
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to 
Netflix.</em></ins></span> The <span 
class="inserted"><ins><em>Netflix</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon the same
-   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2228,87 +2320,44 @@
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app</strong></del></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span> 
and
-    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>image is coming 
from</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
-    the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>way to disable</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server 
accounts,</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if</em></ins></span> it 
<span class="removed"><del><strong>can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>were not hidden</em></ins></span> as <span 
class="removed"><del><strong>a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
-    sounds to be picked up by proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
-    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+    manufacturers in spying on their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>new combined 
surveillance by default.&lt;/p&gt;
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
@@ -2320,604 +2369,591 @@
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> even <span 
class="removed"><del><strong>if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>what they 
wanted</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span>
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on 
what</em></ins></span>
-    users <span class="removed"><del><strong>submit</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs</em></ins></span> 
snoop on <span class="removed"><del><strong>the user&lt;/a&gt;. This is in 
addition to
+      the snooping done by the phone company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get</strong></del></span> <span 
class="inserted"><ins><em>what</em></ins></span>
+    users <span class="removed"><del><strong>to say &ldquo;I agree&rdquo;. 
That is no excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
-    Nuance can save it</em></ins></span> and <span 
class="inserted"><ins><em>would then have to give it to the US 
or</em></ins></span> some
-      <span class="removed"><del><strong>are starting</strong></del></span>
-    <span class="inserted"><ins><em>other government.&lt;/p&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> it to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness of</strong></del></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
+    software <span class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless</em></ins></span> it is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span class="inserted"><ins><em>done 
by free
-    software in your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span class="removed"><del><strong>they 
present</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in 
on a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
+    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
-    snooping <span class="inserted"><ins><em>all the time&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
+    snooping <span class="removed"><del><strong>on its users 
through</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>of 2014, but we don't expect this has got
+    &lt;p&gt;The <span class="removed"><del><strong>app</strong></del></span> 
<span class="inserted"><ins><em>report</em></ins></span> was <span 
class="removed"><del><strong>reporting the temperature</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
+    &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>attitude of</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile 
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed 
to</em></ins></span> report <span class="removed"><del><strong>which other
-    apps</strong></del></span> <span class="inserted"><ins><em>what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span> 
the <span class="removed"><del><strong>vibrator</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the user <span 
class="inserted"><ins><em>watches, and the switch to turn this 
off</em></ins></span> has
-    <span class="removed"><del><strong>installed.</strong></del></span>
-    <span class="inserted"><ins><em>no effect&lt;/a&gt;.  (The fact that the 
transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span class="removed"><del><strong>data 
may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data <span 
class="removed"><del><strong>broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse, it &lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy</em></ins></span> this <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    product could spy</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found</em></ins></span> a way <span 
class="removed"><del><strong>that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
-    and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>use its camera to 
watch</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
-  &lt;/li&gt;
+    Crackers</em></ins></span> found a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span class="inserted"><ins><em>break 
security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
+    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>report its location</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone 
that comes near, or merely
-    passes by,</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
-    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
-      users</strong></del></span>
-    <span class="inserted"><ins><em>video&mdash;Amazon expects 
society</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surrender to.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>someone else and</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
+    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span>
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>videos. That's</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
-    <span class="inserted"><ins><em>security for your home. Security means 
making sure they don't get</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>these
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site</strong></del></span> <span 
class="inserted"><ins><em>look at what's</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+  &lt;li id="M201511250"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article says 
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam 
&ldquo;smart&rdquo; camera</em></ins></span> is <span 
class="removed"><del><strong>a back door, but that could be a
+      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    even when the &ldquo;owner&rdquo; switches</em></ins></span> it <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly 
surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>using it
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-
-  &lt;li&gt;</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product 
as shipped doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;</em></ins></span>
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;</em></ins></span>
+  &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard with which manufacturers would</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>statements 
about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to 
transmit</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span>
-    conversations <span 
class="removed"><del><strong>too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>was unacceptable by 
itself.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>back door, but that could 
be</strong></del></span> <span class="inserted"><ins><em>speech recognition
-    company based in the U.S.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the data to a 
data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with</em></ins></span> a
-      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
-      least.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>mobile phone. This would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span> on <span 
class="removed"><del><strong>Windows installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>child's 
speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> its <span class="removed"><del><strong>manufacturer 
can communicate</strong></del></span>
+    <span class="inserted"><ins><em>customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>it,
+      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>fact
+      that</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest 
Cam</strong></del></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    to snoop</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span 
class="removed"><del><strong>e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
+    &lt;p&gt;Many employers are using</em></ins></span> nonfree <span 
class="removed"><del><strong>software</strong></del></span>
+    <span class="inserted"><ins><em>software, including videoconference 
software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that</em></ins></span> is <span 
class="inserted"><ins><em>in effect</em></ins></span> a <span 
class="inserted"><ins><em>malicious</em></ins></span>
-    surveillance <span 
class="removed"><del><strong>device.</strong></del></span> <span 
class="inserted"><ins><em>feature.&lt;/p&gt;
+    whether you</em></ins></span> are <span 
class="inserted"><ins><em>&ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
-    &lt;p&gt;Google Nest</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
-    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out a software
+    &lt;p&gt;Google Nest</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
     update to its speaker devices using their back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the 
<span class="removed"><del><strong>manufacturer, based on</strong></del></span> 
<span class="inserted"><ins><em>devices now listen for more
-    than just their wake words. Google says</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>software update was sent
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
     out prematurely and on accident and Google was planning on disclosing
     this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="inserted"><ins><em>bosses &lt;a
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span>
-    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>almost 
anything, even probable exposure
+    most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+    be illegal and bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201911190"&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>household
-    through connected surveillance devices.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
+    a <span class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;</em></ins></span>
+    access <span class="removed"><del><strong>its computers 
remotely</strong></del></span> <span class="inserted"><ins><em>the user's wifi 
password&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>household</em></ins></span>
+    through <span class="inserted"><ins><em>connected surveillance 
devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if the devices implemented proper
+    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not be sufficient to carry
+    out any significant surveillance</em></ins></span> if <span 
class="removed"><del><strong>it asked</strong></del></span> <span 
class="inserted"><ins><em>the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers</em></ins></span> for
+    <span class="removed"><del><strong>authentication, you couldn't be 
confident that Nissan has</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>person's 
voice.  It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
-    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
-    even if <span class="removed"><del><strong>it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is</em></ins></span> no
+    <span class="removed"><del><strong>access.  The software 
in</strong></del></span>
+    <span class="inserted"><ins><em>way to see or control what it records or 
sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends</em></ins></span>
+    it <span class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even</strong></del></span> <span class="inserted"><ins><em>to 
Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even</em></ins></span> if <span class="removed"><del><strong>no one 
connects</strong></del></span> <span class="inserted"><ins><em>users request 
deletion of their data from Amazon's servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest 
thermostat,</em></ins></span> the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span> 
the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>phone company</strong></del></span> 
<span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span>
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to
     <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>past (and, who 
knows,
-    in</em></ins></span> the <span class="removed"><del><strong>cell phone 
modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;</em></ins></span>
+    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
+    in</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>listen 
to&lt;/a&gt;. The Google</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>Apple
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>the Alexa 
service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>saying &ldquo;We won't
-    tell you how</em></ins></span> and <span 
class="removed"><del><strong>should be replaced</strong></del></span> <span 
class="inserted"><ins><em>where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates</em></ins></span> with <span 
class="removed"><del><strong>anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>HP servers&lt;/a&gt; to make sure</em></ins></span> 
the <span class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>user is still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>ink subscription 
program may be cheaper in some
-    specific cases, it spies on users,</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>involves totally unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon 
device,</em></ins></span>
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
     and <span class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="removed"><del><strong>doesn't
       store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
@@ -3014,17 +3050,29 @@
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws.</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>unauthorized people,</em></ins></span>
+    and <span class="removed"><del><strong>cable&lt;/a&gt;. Even if the image 
is coming</strong></del></span> <span class="inserted"><ins><em>can send 
messages</em></ins></span> from <span class="inserted"><ins><em>unauthorized 
devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>user's own
+    computer, the TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="inserted"><ins><em>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence 
of</strong></del></span> a <span class="removed"><del><strong>way to
-    disable the surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>back door, but that 
could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>was in
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is a back door, but that could 
be</em></ins></span> a <span class="removed"><del><strong>way to
+    disable the surveillance, even if it were not hidden 
as</strong></del></span>
+    <span class="inserted"><ins><em>misunderstanding.  
However,</em></ins></span> it <span class="removed"><del><strong>was in
     these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -3775,7 +3823,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- po/proprietary-surveillance.de.po   7 Oct 2020 17:02:20 -0000       1.344
+++ po/proprietary-surveillance.de.po   16 Oct 2020 11:32:29 -0000      1.345
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4780,6 +4780,34 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# | 
href=\"/philosophy/words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>.-]
+# | {+word &ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean
+# | &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">„monetarisieren“</a> verwendet."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href="
 "\"https://www.theregister.co.uk/2016/03/02/";
 "chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "

Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- po/proprietary-surveillance.es.po   8 Oct 2020 08:59:04 -0000       1.84
+++ po/proprietary-surveillance.es.po   16 Oct 2020 11:32:29 -0000      1.85
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-10-08 10:33+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -4246,6 +4247,34 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
+"philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href="
 "\"https://www.theregister.co.uk/2016/03/02/";
 "chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.541
retrieving revision 1.542
diff -u -b -r1.541 -r1.542
--- po/proprietary-surveillance.fr.po   7 Oct 2020 20:29:14 -0000       1.541
+++ po/proprietary-surveillance.fr.po   16 Oct 2020 11:32:29 -0000      1.542
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-10-07 21:58+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -4253,6 +4254,34 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Notez que cet article emploie à mauvais escient l'expression "
+"<cite><a href=\"/philosophy/free-sw.html\">free software</a></cite> dans le "
+"sens de « logiciel gratuit ».)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href="
 "\"https://www.theregister.co.uk/2016/03/02/";
 "chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/proprietary-surveillance.it-diff.html    7 Oct 2020 17:02:20 -0000       
1.196
+++ po/proprietary-surveillance.it-diff.html    16 Oct 2020 11:32:29 -0000      
1.197
@@ -1993,19 +1993,16 @@
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that</em></ins></span> track <span 
class="removed"><del><strong>you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by 
TV
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2894,9 +2891,10 @@
     listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially spying
+    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially spying
     on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    about</em></ins></span> you 
+      <span class="removed"><del><strong>across</strong></del></span> <span 
class="inserted"><ins><em>for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
@@ -2933,6 +2931,21 @@
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized</em></ins></span> 
devices.&lt;/p&gt;
+ 
+      <span class="removed"><del><strong>&lt;p&gt;It is 
possible</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;small&gt;(Note that this 
article misuses the word &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
@@ -3620,7 +3633,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- po/proprietary-surveillance.it.po   7 Oct 2020 17:02:20 -0000       1.356
+++ po/proprietary-surveillance.it.po   16 Oct 2020 11:32:29 -0000      1.357
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4496,6 +4496,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href="
 "\"https://www.theregister.co.uk/2016/03/02/";
 "chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- po/proprietary-surveillance.ja-diff.html    7 Oct 2020 17:02:20 -0000       
1.214
+++ po/proprietary-surveillance.ja-diff.html    16 Oct 2020 11:32:29 -0000      
1.215
@@ -1406,90 +1406,45 @@
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>aggregated,&rdquo; 
it can easily be
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>insurance 
companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
     traced back to the woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software app</em></ins></span> that <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>same 
thing without
+    free-software app that does more or less the same thing without
     spying on you is available from &lt;a
     href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>new 
one</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>being 
developed&lt;/a&gt;.&lt;/p&gt;
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the phone has</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to the data. This 
results in massive
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
     surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found that 
19</em></ins></span> of <span class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>them &lt;a
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can 
use</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people</em></ins></span> in <span class="removed"><del><strong>Cisco 
TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>poor
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
@@ -2321,15 +2276,17 @@
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
     and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
@@ -2372,18 +2329,22 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
@@ -2398,7 +2359,8 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    was snooping</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>its users through 
the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
@@ -2409,18 +2371,21 @@
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
+    &lt;p&gt;The company</em></ins></span> that <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
+    was sued for collecting lots of personal information about how 
people</em></ins></span>
+    used <span class="removed"><del><strong>did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
+    true, but it doesn't</em></ins></span> really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>matter. If it had sold the data to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
     the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
@@ -2445,53 +2410,79 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;p&gt;Many employers are using nonfree
     software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    whether you are &ldquo;active,&rdquo; that is</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
-    &lt;p&gt;Google Nest &lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    &lt;p&gt;Google Nest</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door &lt;a
-    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    update to its speaker devices using their back door</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
@@ -2523,217 +2514,218 @@
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
-    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
+    when <span class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
     should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
 
-  &lt;li id="M201905061"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="inserted"><ins><em>sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, 
where</em></ins></span> they <span class="removed"><del><strong>report even 
which page</strong></del></span> <span class="inserted"><ins><em>can be 
accessed by
     advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
+    deleting</em></ins></span> the <span class="removed"><del><strong>user 
reads</strong></del></span> <span class="inserted"><ins><em>collected 
information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
     the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+    Alexa. As a result, Amazon has a very precise picture of users' 
life</em></ins></span>
+    at <span class="removed"><del><strong>what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>home, not only in the present, but in the past (and, 
who knows,
+    in the future too?)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service staff even has 
access</em></ins></span> to <span class="removed"><del><strong>Adobe&lt;/a&gt;. 
 Adobe's &ldquo;excuse&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    tell you how and where</em></ins></span> it's
+      <span class="removed"><del><strong>needed</strong></del></span> <span 
class="inserted"><ins><em>done&rdquo;), users have no way</em></ins></span>
+    to <span class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
-
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions</em></ins></span> in <span 
class="removed"><del><strong>Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise 
be</em></ins></span> in <span class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>know what happens to 
the recordings unless human eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span>
 
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>do this.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+    paying</em></ins></span> for
+    <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>the 
subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;Even though the ink subscription program may</em></ins></span> be 
<span class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be</em></ins></span> in
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>&ldquo;owner&rdquo; 
switches it &ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>product in that country,
-    do you think Amazon would have the moral fiber</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>say 
no?&lt;/p&gt;
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
+    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that</em></ins></span> snoops on 
<span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its user by
-    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="inserted"><ins><em>&lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+  &lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>user reads at what</strong></del></span> 
time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>car's movements</strong></del></span> <span 
class="inserted"><ins><em>house,</em></ins></span> all the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-    <span class="inserted"><ins><em>&lt;p&gt;Today's technological practice 
does not include any way of making
+    &lt;p&gt;Today's technological practice does not include any way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
+    on you.  Even if</em></ins></span> it is <span 
class="removed"><del><strong>possible to physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
     about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers</em></ins></span> send 
<span class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a 
lot</em></ins></span> of
-    data <span class="inserted"><ins><em>about the user&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
+    data</em></ins></span> about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
-  effectively
-  anyone</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed through</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>normal</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in the car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect</em></ins></span> of <span 
class="inserted"><ins><em>what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2741,36 +2733,35 @@
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that</em></ins></span> connects to <span class="removed"><del><strong>the 
car remotely, the cell phone
-    modem enables the phone company to track the car's movements all
-    the time; it is possible to physically remove the cell phone modem
-    though.&lt;/p&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span>
+    are <span class="removed"><del><strong>an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>malware, violating people (specially children's)
+    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>security 
breakers&lt;/a&gt;</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site</em></ins></span> in <span 
class="removed"><del><strong>cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in</strong></del></span> <span 
class="inserted"><ins><em>article says</em></ins></span> this <span 
class="removed"><del><strong>article,</strong></del></span> is <span 
class="removed"><del><strong>not
-      really</strong></del></span> a <span class="removed"><del><strong>matter 
of proprietary surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201603020"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The 
company</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
-      determine the car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information,</strong></del></span> <span 
class="inserted"><ins><em>back door,</em></ins></span> but <span 
class="removed"><del><strong>if the state orders it to get the data
-      and hand</strong></del></span> <span class="inserted"><ins><em>that 
could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>is 
certainly surveillance, at least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article</em></ins></span> says <span 
class="removed"><del><strong>it doesn't
+      store</strong></del></span> this <span 
class="removed"><del><strong>information,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>if the state orders it to get the data
+      and hand it over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that could 
be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -3458,7 +3449,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- po/proprietary-surveillance.ja.po   7 Oct 2020 17:02:20 -0000       1.338
+++ po/proprietary-surveillance.ja.po   16 Oct 2020 11:32:29 -0000      1.339
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3555,6 +3555,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href="
 "\"https://www.theregister.co.uk/2016/03/02/";
 "chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- po/proprietary-surveillance.pot     7 Oct 2020 17:02:20 -0000       1.277
+++ po/proprietary-surveillance.pot     16 Oct 2020 11:32:29 -0000      1.278
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2864,6 +2864,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
 "
+"permit access by security breakers</a> and unauthorized people, and can send "
+"messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean "
+"&ldquo;crackers.&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a "
 
"href=\"https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\";>
 "
 "that connects to an unidentified site in China</a>."

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.633
retrieving revision 1.634
diff -u -b -r1.633 -r1.634
--- po/proprietary-surveillance.ru.po   8 Oct 2020 09:59:31 -0000       1.633
+++ po/proprietary-surveillance.ru.po   16 Oct 2020 11:32:30 -0000      1.634
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -4209,6 +4210,35 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Обращаем ваше внимание, что в этой 
статье выражение &ldquo;<a href="
+"\"/philosophy/free-sw.html\"><span lang=\"en\" xml:lang=\"en\">free "
+"software</span></a>&rdquo; неверно используется для 
обозначения бесплатных "
+"программ.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href="
 "\"https://www.theregister.co.uk/2016/03/02/";
 "chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- po/proprietary.de-diff.html 7 Oct 2020 17:02:20 -0000       1.179
+++ po/proprietary.de-diff.html 16 Oct 2020 11:32:30 -0000      1.180
@@ -58,8 +58,9 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -125,20 +125,20 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -155,16 +155,16 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -212,6 +212,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into &lt;a
@@ -243,13 +256,6 @@
     on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -312,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary.de.po        7 Oct 2020 17:02:20 -0000       1.219
+++ po/proprietary.de.po        16 Oct 2020 11:32:30 -0000      1.220
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# | 
href=\"/philosophy/words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>.-]
+# | {+word &ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean
+# | &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">„monetarisieren“</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -487,14 +515,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !
@@ -653,17 +673,6 @@
 
 #, fuzzy
 #~| msgid ""
-#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#~| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
-#~ msgid ""
-#~ "Unfortunately, the article <a href=\"/philosophy/words-to-avoid."
-#~ "html#Hacker\">improperly refers to crackers as &ldquo;hackers&rdquo;</a>."
-#~ msgstr ""
-#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
-#~ "words-to-avoid#Monetize\">„monetarisieren“</a> verwendet."
-
-#, fuzzy
-#~| msgid ""
 #~| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
 #~| "company-has-already-logge-1795906081\"> snoop on information that users "
 #~| "have typed into a form but not sent</a>."

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.324
retrieving revision 1.325
diff -u -b -r1.324 -r1.325
--- po/proprietary.es.po        8 Oct 2020 08:59:04 -0000       1.324
+++ po/proprietary.es.po        16 Oct 2020 11:32:30 -0000      1.325
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -312,6 +313,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
+"philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -363,18 +392,6 @@
 "accused-watching-Instagram-users-mobile-cameras.html\">espía a los usuarios "
 "de Instagram</a> activando a escondidas la cámara del dispositivo."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Los cascos Oculus<a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">exigen a los usuarios identificarse en Facebook</a>. Esto da a Facebook "
-"plena capacidad para espiar en todo momento a los usuarios de Oculus."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -454,3 +471,15 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Los cascos Oculus<a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">exigen a los usuarios identificarse en Facebook</a>. Esto da a "
+#~ "Facebook plena capacidad para espiar en todo momento a los usuarios de "
+#~ "Oculus."

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.365
retrieving revision 1.366
diff -u -b -r1.365 -r1.366
--- po/proprietary.fr.po        7 Oct 2020 20:00:19 -0000       1.365
+++ po/proprietary.fr.po        16 Oct 2020 11:32:30 -0000      1.366
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-10-07 21:58+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -308,6 +309,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] &ldquo;<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>&rdquo; referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;+} to
+# | [-zero price.)</small>-] {+mean &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>(Notez que cet article emploie à mauvais escient l'expression "
+"<cite><a href=\"/philosophy/free-sw.html\">free software</a></cite> dans le "
+"sens de « logiciel gratuit ».)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -359,18 +388,6 @@
 "utilisateurs d'Instagram</a> en activant subrepticement la caméra du "
 "téléphone."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera à "
-"Facebook carte blanche pour les espionner systématiquement."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -443,3 +460,14 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera "
+#~ "à Facebook carte blanche pour les espionner systématiquement."

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- po/proprietary.it-diff.html 7 Oct 2020 17:02:20 -0000       1.191
+++ po/proprietary.it-diff.html 16 Oct 2020 11:32:30 -0000      1.192
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,20 +58,20 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into &lt;a
@@ -242,13 +255,6 @@
     on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -311,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- po/proprietary.it.po        7 Oct 2020 17:02:20 -0000       1.228
+++ po/proprietary.it.po        16 Oct 2020 11:32:30 -0000      1.229
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -491,14 +507,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/proprietary.ja-diff.html 7 Oct 2020 17:02:20 -0000       1.196
+++ po/proprietary.ja-diff.html 16 Oct 2020 11:32:30 -0000      1.197
@@ -55,14 +55,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -153,15 +153,15 @@
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
@@ -209,6 +209,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into &lt;a
@@ -240,13 +253,6 @@
     on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -309,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- po/proprietary.ja.po        7 Oct 2020 17:02:21 -0000       1.212
+++ po/proprietary.ja.po        16 Oct 2020 11:32:30 -0000      1.213
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -352,14 +368,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- po/proprietary.nl-diff.html 7 Oct 2020 17:02:21 -0000       1.192
+++ po/proprietary.nl-diff.html 16 Oct 2020 11:32:30 -0000      1.193
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,15 +58,15 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into &lt;a
@@ -242,13 +255,6 @@
     on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -311,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:21 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary.nl.po        7 Oct 2020 17:02:21 -0000       1.202
+++ po/proprietary.nl.po        16 Oct 2020 11:32:30 -0000      1.203
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -395,14 +411,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- po/proprietary.pl-diff.html 7 Oct 2020 17:02:21 -0000       1.209
+++ po/proprietary.pl-diff.html 16 Oct 2020 11:32:30 -0000      1.210
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -55,7 +55,7 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -63,7 +63,7 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of September, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 540 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>September, 2020, the pages in this directory 
list around 450
+instances of malicious functionalities (with more than 540 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -154,16 +154,16 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -209,6 +209,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into &lt;a
@@ -240,13 +253,6 @@
     on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -309,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:21 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- po/proprietary.pl.po        7 Oct 2020 17:02:21 -0000       1.195
+++ po/proprietary.pl.po        16 Oct 2020 11:32:30 -0000      1.196
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -572,14 +588,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- po/proprietary.pot  7 Oct 2020 17:02:21 -0000       1.192
+++ po/proprietary.pot  16 Oct 2020 11:32:30 -0000      1.193
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
 "
+"permit access by security breakers</a> and unauthorized people, and can send "
+"messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean "
+"&ldquo;crackers.&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a "
 
"href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge\";>
 "
@@ -289,14 +306,6 @@
 "on Instagram</a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a "
-"href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\";>require
 "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary.pt-br-diff.html      11 Oct 2020 17:28:43 -0000      1.1
+++ po/proprietary.pt-br-diff.html      16 Oct 2020 11:32:30 -0000      1.2
@@ -186,32 +186,46 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li <span class="removed"><del><strong>id="M202007010"&gt;
-    &lt;p&gt;BMW will remotely</strong></del></span> <span 
class="inserted"><ins><em>id="M202003110"&gt;
-    &lt;p&gt;Roblox (among many other games)
-    created anti-features which sucker children into</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
-    enable and disable functionality in cars&lt;/a&gt; through a universal
-    back door.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
-    utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; 
through</strong></del></span> <span 
class="inserted"><ins><em>id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>universal
+    back door.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that 
bosses</strong></del></span> <span class="inserted"><ins><em>lot of security 
flaws.</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, so the
     bosses can spy on them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker</em></ins></span> is <span 
class="removed"><del><strong>not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable 
exposure</strong></del></span>
-    <span class="inserted"><ins><em>tethered</em></ins></span> to <span 
class="removed"><del><strong>contagious disease that can be fatal.  Software 
like this should
-    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The 
boss</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and</em></ins></span> can <span class="removed"><del><strong>coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease</strong></del></span> <span 
class="inserted"><ins><em>send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>can be fatal.  Software like</strong></del></span> 
this <span class="removed"><del><strong>should
+    be illegal and bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>article 
misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504210"&gt;
-    &lt;p&gt;Runescape is</strong></del></span> a <span 
class="removed"><del><strong>popular online game with 
some</strong></del></span> <span class="inserted"><ins><em>server. The company 
suddenly</em></ins></span> &lt;a
+  &lt;li <span class="removed"><del><strong>id="M201504210"&gt;
+    &lt;p&gt;Runescape</strong></del></span> <span 
class="inserted"><ins><em>id="M202003110"&gt;
+    &lt;p&gt;Roblox (among many other games)
+    created anti-features which sucker children into &lt;a
+    
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
+    utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007270"&gt;
+    &lt;p&gt;The Mellow sous-vide cooker</em></ins></span> is
+    <span class="inserted"><ins><em>tethered to</em></ins></span> a <span 
class="removed"><del><strong>popular online game with 
some</strong></del></span> <span class="inserted"><ins><em>server. The company 
suddenly</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
     addictive features&lt;/a&gt; derived</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
@@ -229,39 +243,31 @@
   &lt;li <span class="removed"><del><strong>id="M202006260"&gt;
     &lt;p&gt;Most apps</strong></del></span> <span 
class="inserted"><ins><em>id="M202009270"&gt;
     &lt;p&gt;Many employers</em></ins></span> are <span 
class="removed"><del><strong>malware, but
-    Trump's campaign app, like Modi's campaign app,</strong></del></span> 
<span class="inserted"><ins><em>using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that</em></ins></span> is <span 
class="inserted"><ins><em>in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202009183"&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a
+    Trump's campaign app, like Modi's campaign app, is</strong></del></span> 
<span class="inserted"><ins><em>using nonfree
+    software, including videoconference software, to</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops</em></ins></span>
-    on <span class="inserted"><ins><em>Instagram&lt;/a&gt;</em></ins></span> 
users <span class="removed"><del><strong>as well
-    as snooping</strong></del></span> <span class="inserted"><ins><em>by 
surreptitously turning</em></ins></span> on <span 
class="removed"><del><strong>them itself&lt;/a&gt;.&lt;/p&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
     approach, but that does not tell us whether it has functionalities we
-    consider malicious, such as sending data</strong></del></span> the <span 
class="removed"><del><strong>user has not explicitly
-    asked to send.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device's
-    camera.&lt;/p&gt;</em></ins></span>
+    consider malicious, such as sending data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If</em></ins></span> 
the <span class="removed"><del><strong>user has not explicitly
+    asked to send.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers are able to</strong></del></span> <span 
class="inserted"><ins><em>id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a
+    &lt;p&gt;TV manufacturers are able to</strong></del></span> <span 
class="inserted"><ins><em>id="M202009183"&gt;
+    &lt;p&gt;Facebook</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;.</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;.</em></ins></span> This 
<span class="removed"><del><strong>is illegal due</strong></del></span> <span 
class="inserted"><ins><em>will give Facebook
-    free rein</em></ins></span> to
-    <span class="removed"><del><strong>the Video Privacy Protection Act of 
1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus 
users.&lt;/p&gt;</em></ins></span>
+    every second of what the user is watching&lt;/a&gt;. This is illegal due 
to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt; users by surreptitously turning 
on</em></ins></span> the <span class="removed"><del><strong>Video Privacy 
Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device's
+    camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -324,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/11 17:28:43 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- po/proprietary.pt-br.po     7 Oct 2020 17:02:21 -0000       1.327
+++ po/proprietary.pt-br.po     16 Oct 2020 11:32:30 -0000      1.328
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -311,6 +311,28 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
+#| "of &ldquo;gratis.&rdquo;</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>Nota: este artigo faz uso da palavra “<i lang=\"en\">free</i>” no "
+"sentido de “grátis”.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -343,14 +365,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -714,13 +728,6 @@
 #~ "usar o software livre."
 
 #~ msgid ""
-#~ "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
-#~ "of &ldquo;gratis.&rdquo;</small>"
-#~ msgstr ""
-#~ "<small>Nota: este artigo faz uso da palavra “<i lang=\"en\">free</i>” 
no "
-#~ "sentido de “grátis”.</small>"
-
-#~ msgid ""
 #~ "Some Avast and AVG extensions for Firefox and Chrome were found to <a "
 #~ "href=\"https://www.itpro.co.uk/security/internet-security/354417/avast-";
 #~ "and-avg-extensions-pulled-from-chrome\"> snoop on users' detailed "

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.400
retrieving revision 1.401
diff -u -b -r1.400 -r1.401
--- po/proprietary.ru.po        8 Oct 2020 09:59:31 -0000       1.400
+++ po/proprietary.ru.po        16 Oct 2020 11:32:30 -0000      1.401
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,33 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-<small>Note:-]{+<small>(Note that+} this article [-uses-] {+misuses+}
+# | the word [-&ldquo;free&rdquo; in the sense of
+# | &ldquo;gratis.&rdquo;</small>-] {+&ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean
+# | &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
+#| "of &ldquo;gratis.&rdquo;</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>Обратите внимание, что в статье слово 
&ldquo;свободный&rdquo; "
+"используется в смысле 
&ldquo;бесплатный&rdquo;.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -362,18 +390,6 @@
 
"accused-watching-Instagram-users-mobile-cameras.html\">подглядывает
 за "
 "пользователями Instagram</a>, скрытно включая 
камеру устройства."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Гарнитуры Occulus <a 
href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">требуют, чтобы пользователи 
идентифицировались на Facebook</a>. Это "
-"позволит Facebook наблюдать за 
пользователями Occulus, сколько душе угодно."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -450,6 +466,18 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Гарнитуры Occulus <a 
href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">требуют, чтобы пользователи 
идентифицировались на Facebook</a>. Это "
+#~ "позволит Facebook наблюдать за 
пользователями Occulus, сколько душе "
+#~ "угодно."
+
+#~ msgid ""
 #~ "Apple is <a href=\"https://www.theguardian.com/technology/2020/aug/30/";
 #~ "this-isnt-the-1990s-apple-under-pressure-from-app-developers\"> putting "
 #~ "the squeeze on all business</a> conducted through apps for iMonsters."
@@ -2239,13 +2267,6 @@
 #~ "свободными программами."
 
 #~ msgid ""
-#~ "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
-#~ "of &ldquo;gratis.&rdquo;</small>"
-#~ msgstr ""
-#~ "<small>Обратите внимание, что в статье 
слово &ldquo;свободный&rdquo; "
-#~ "используется в смысле 
&ldquo;бесплатный&rdquo;.</small>"
-
-#~ msgid ""
 #~ "iMonsters and Android phones, when used for work, give employers powerful "
 #~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-";
 #~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "

Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/proprietary.tr.po        7 Oct 2020 21:13:35 -0000       1.59
+++ po/proprietary.tr.po        16 Oct 2020 11:32:30 -0000      1.60
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-10-07 23:09+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.1\n"
 
@@ -306,6 +307,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -356,19 +373,6 @@
 "href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-";
 "watching-Instagram-users-mobile-cameras.html\">gizlice gözetliyor</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Oculus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
-"Facebook'a Oculus kullanıcılarını yaygın bir şekilde gizlice 
gözetlemesi "
-"için tam yetki veriyor."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -450,6 +454,18 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Oculus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
+#~ "Facebook'a Oculus kullanıcılarını yaygın bir şekilde gizlice 
gözetlemesi "
+#~ "için tam yetki veriyor."
+
+#~ msgid ""
 #~ "Apple is <a href=\"https://www.theguardian.com/technology/2020/aug/30/";
 #~ "this-isnt-the-1990s-apple-under-pressure-from-app-developers\"> putting "
 #~ "the squeeze on all business</a> conducted through apps for iMonsters."

Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/proprietary.zh-cn.po     10 Oct 2020 05:28:46 -0000      1.65
+++ po/proprietary.zh-cn.po     16 Oct 2020 11:32:30 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-10-10 13:07+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -288,6 +289,26 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
+#| "of &ldquo;gratis.&rdquo;</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr "<small>注:这篇文章中“free”的意思是“å…
è´¹çš„”。</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -334,18 +355,6 @@
 "article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"
 "\">嗅探 Instagram</a> 的用户。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Occulus 头戴设备 <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october\">要"
-"求用户在 Facebook 上认证</a>。这会给 Facebook 全面嗅探 Occulus 
用户的免费抓"
-"手。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -430,6 +439,17 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Occulus 头戴设备 <a 
href=\"https://www.theverge.com/2020/8/18/21372435/";
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october\">"
+#~ "要求用户在 Facebook 上认证</a>。这会给 Facebook 全面嗅探 
Occulus 用户的免"
+#~ "费抓手。"
+
+#~ msgid ""
 #~ "Apple is <a href=\"https://www.theguardian.com/technology/2020/aug/30/";
 #~ "this-isnt-the-1990s-apple-under-pressure-from-app-developers\"> putting "
 #~ "the squeeze on all business</a> conducted through apps for iMonsters."
@@ -816,11 +836,6 @@
 #~ "由程序都可以这æ 
·åšï¼Œè¿™æ˜¯æ”¹ç”¨è‡ªç”±è½¯ä»¶çš„一个很好的理由。"
 
 #~ msgid ""
-#~ "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
-#~ "of &ldquo;gratis.&rdquo;</small>"
-#~ msgstr "<small>注:这篇文章中“free”的意思是“å…
è´¹çš„”。</small>"
-
-#~ msgid ""
 #~ "Some Avast and AVG extensions for Firefox and Chrome were found to <a "
 #~ "href=\"https://www.itpro.co.uk/security/internet-security/354417/avast-";
 #~ "and-avg-extensions-pulled-from-chrome\"> snoop on users' detailed "

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- po/proprietary.zh-tw-diff.html      7 Oct 2020 17:02:21 -0000       1.172
+++ po/proprietary.zh-tw-diff.html      16 Oct 2020 11:32:30 -0000      1.173
@@ -58,8 +58,9 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -125,20 +125,20 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -155,16 +155,16 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -212,6 +212,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit access by security breakers&lt;/a&gt; and unauthorized people,
+    and can send messages from unauthorized devices.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into &lt;a
@@ -243,13 +256,6 @@
     on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -312,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/07 17:02:21 $
+$Date: 2020/10/16 11:32:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- po/proprietary.zh-tw.po     7 Oct 2020 17:02:21 -0000       1.182
+++ po/proprietary.zh-tw.po     16 Oct 2020 11:32:30 -0000      1.183
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Roblox (among many other games)  created anti-features which sucker children "
 "into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-";
 "spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -465,14 +481,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- po/pt-br.po 7 Oct 2020 17:02:21 -0000       1.280
+++ po/pt-br.po 16 Oct 2020 11:32:30 -0000      1.281
@@ -8741,6 +8741,28 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
+#| "of &ldquo;gratis.&rdquo;</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>Nota: este artigo faz uso da palavra “<i lang=\"en\">free</i>” no "
+"sentido de “grátis”.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -8756,14 +8778,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -8821,6 +8835,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.478
retrieving revision 1.479
diff -u -b -r1.478 -r1.479
--- po/ru.po    8 Oct 2020 10:29:34 -0000       1.478
+++ po/ru.po    16 Oct 2020 11:32:30 -0000      1.479
@@ -10633,6 +10633,33 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-<small>Note:-]{+<small>(Note that+} this article [-uses-] {+misuses+}
+# | the word [-&ldquo;free&rdquo; in the sense of
+# | &ldquo;gratis.&rdquo;</small>-] {+&ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean
+# | &ldquo;crackers.&rdquo;)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
+#| "of &ldquo;gratis.&rdquo;</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+"<small>Обратите внимание, что в статье слово 
&ldquo;свободный&rdquo; "
+"используется в смысле 
&ldquo;бесплатный&rdquo;.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -10657,18 +10684,6 @@
 
"accused-watching-Instagram-users-mobile-cameras.html\">подглядывает
 за "
 "пользователями Instagram</a>, скрытно включая 
камеру устройства."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Гарнитуры Occulus <a 
href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">требуют, чтобы пользователи 
идентифицировались на Facebook</a>. Это "
-"позволит Facebook наблюдать за 
пользователями Occulus, сколько душе угодно."
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -10724,6 +10739,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Гарнитуры Occulus <a 
href=\"https://www.theverge.com/2020/8/18/21372435/";
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">требуют, чтобы пользователи 
идентифицировались на Facebook</a>. Это "
+"позволит Facebook наблюдать за 
пользователями Occulus, сколько душе угодно."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "

Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/tr.po    7 Oct 2020 21:28:56 -0000       1.58
+++ po/tr.po    16 Oct 2020 11:32:31 -0000      1.59
@@ -7756,6 +7756,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7780,25 +7796,6 @@
 "href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-";
 "watching-Instagram-users-mobile-cameras.html\">gizlice gözetliyor</a>."
 
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
-#| "\">require users to identify themselves to Facebook</a>. This will give "
-#| "Facebook free rein to pervasively snoop on Occulus users."
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Occulus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
-"Facebook'a Occulus kullanıcılarını yaygın bir şekilde gizlice 
gözetlemesi "
-"için tam yetki veriyor."
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -7854,6 +7851,25 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#| "\">require users to identify themselves to Facebook</a>. This will give "
+#| "Facebook free rein to pervasively snoop on Occulus users."
+msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Occulus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
+"Facebook'a Occulus kullanıcılarını yaygın bir şekilde gizlice 
gözetlemesi "
+"için tam yetki veriyor."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "

Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/zh-cn.po 10 Oct 2020 05:28:46 -0000      1.55
+++ po/zh-cn.po 16 Oct 2020 11:32:31 -0000      1.56
@@ -7529,6 +7529,26 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
+#| "of &ldquo;gratis.&rdquo;</small>"
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr "<small>注:这篇文章中“free”的意思是“å…
è´¹çš„”。</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7551,24 +7571,6 @@
 "article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"
 "\">嗅探 Instagram</a> 的用户。"
 
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
-#| "\">require users to identify themselves to Facebook</a>. This will give "
-#| "Facebook free rein to pervasively snoop on Occulus users."
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Occulus 头戴设备 <a href=\"https://www.theverge.com/2020/8/18/21372435/";
-"oculus-facebook-login-change-separate-account-support-end-quest-october\">要"
-"求用户在 Facebook 上认证</a>。这会给 Facebook 免费全面嗅探 
Occulus 用户的抓"
-"手。"
-
 #
 #
 #
@@ -7621,6 +7623,24 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#| "\">require users to identify themselves to Facebook</a>. This will give "
+#| "Facebook free rein to pervasively snoop on Occulus users."
+msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Occulus 头戴设备 <a href=\"https://www.theverge.com/2020/8/18/21372435/";
+"oculus-facebook-login-change-separate-account-support-end-quest-october\">要"
+"求用户在 Facebook 上认证</a>。这会给 Facebook 免费全面嗅探 
Occulus 用户的抓"
+"手。"
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/zh-tw.po 7 Oct 2020 17:02:21 -0000       1.216
+++ po/zh-tw.po 16 Oct 2020 11:32:31 -0000      1.217
@@ -7690,6 +7690,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's)  privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word &ldquo;<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>&rdquo; to mean &ldquo;crackers."
+"&rdquo;)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many employers are using nonfree software, including videoconference "
 "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7705,14 +7721,6 @@
 "a> users by surreptitously turning on the device's camera."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
 #
 #
 #
@@ -7774,6 +7782,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-";
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
 "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
 "information to identify who is running it</a>. The result is often a legal "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]