www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Fri, 16 Oct 2020 11:02:49 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/10/16 11:02:48

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.385&r2=1.386
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.545&r2=1.546
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.358&r2=1.359
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.635&r2=1.636
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.480&r2=1.481
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.218&r2=1.219

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- de.po       16 Oct 2020 14:33:56 -0000      1.218
+++ de.po       16 Oct 2020 15:02:45 -0000      1.219
@@ -12255,8 +12255,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- es.po       16 Oct 2020 14:33:56 -0000      1.312
+++ es.po       16 Oct 2020 15:02:45 -0000      1.313
@@ -12162,8 +12162,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.385
retrieving revision 1.386
diff -u -b -r1.385 -r1.386
--- fr.po       16 Oct 2020 14:33:56 -0000      1.385
+++ fr.po       16 Oct 2020 15:02:45 -0000      1.386
@@ -10698,8 +10698,9 @@
 # | people (specially children's)  privacy. In addition, they have a lot of
 # | security flaws. <a
 # | 
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
-# | permit access by security breakers</a> and unauthorized [-people, and can
-# | send messages from unauthorized devices.-] {+people.+}
+# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | unauthorized [-people, and can send messages from unauthorized devices.-]
+# | {+people) to access</a> the watch.+}
 #, fuzzy
 #| msgid ""
 #| "Internet-enabled watches with proprietary software are malware, violating "
@@ -10711,8 +10712,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 "Les montres connectées utilisant du logiciel privateur sont des objets "
 "malfaisants, car elles violent la vie privée des gens et en particulier des "
@@ -12166,6 +12167,29 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "Internet-enabled watches with proprietary software are malware, "
+#~| "violating people (specially children's)  privacy. In addition, they have "
+#~| "a lot of security flaws. <a href=\"https://www.wired.com/story/kid-";
+#~| "smartwatch-security-vulnerabilities/\">They permit access by security "
+#~| "breakers</a> and unauthorized people, and can send messages from "
+#~| "unauthorized devices."
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's)  privacy. In addition, they have a lot of "
+#~ "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+#~ "security-vulnerabilities/\">They permit access by security breakers</a> "
+#~ "and unauthorized people."
+#~ msgstr ""
+#~ "Les montres connectées utilisant du logiciel privateur sont des objets "
+#~ "malfaisants, car elles violent la vie privée des gens et en particulier "
+#~ "des enfants. De plus, elles ont un grand nombre de vulnérabilités. <a "
+#~ "href=\"https://www.wired.com/story/kid-smartwatch-security-";
+#~ "vulnerabilities/\">Les briseurs de sécurité y ont accès</a> ainsi que 
des "
+#~ "personnes non autorisées, et elles peuvent communiquer avec des appareils 
"
+#~ "non autorisés."
+
 #~ msgid ""
 #~ "Internet-enabled watches with proprietary software are malware, violating "
 #~ "people (specially children's)  privacy. In addition, they have a lot of "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- it.po       16 Oct 2020 14:33:56 -0000      1.218
+++ it.po       16 Oct 2020 15:02:45 -0000      1.219
@@ -11489,8 +11489,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- ja.po       16 Oct 2020 14:33:56 -0000      1.226
+++ ja.po       16 Oct 2020 15:02:45 -0000      1.227
@@ -8956,8 +8956,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- nl.po       16 Oct 2020 14:33:56 -0000      1.219
+++ nl.po       16 Oct 2020 15:02:45 -0000      1.220
@@ -8306,8 +8306,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- pl.po       16 Oct 2020 14:33:56 -0000      1.218
+++ pl.po       16 Oct 2020 15:02:45 -0000      1.219
@@ -7804,8 +7804,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- pot 16 Oct 2020 14:33:57 -0000      1.217
+++ pot 16 Oct 2020 15:02:45 -0000      1.218
@@ -7132,8 +7132,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-surveillance.de-diff.html       16 Oct 2020 14:33:57 -0000      
1.132
+++ proprietary-surveillance.de-diff.html       16 Oct 2020 15:02:45 -0000      
1.133
@@ -2921,22 +2921,22 @@
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> <span class="inserted"><ins><em>present, but 
in</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
+    in</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
@@ -2980,7 +2980,7 @@
       store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
+    easier for Amazon. And</em></ins></span> if <span 
class="removed"><del><strong>the state orders it</strong></del></span> <span 
class="inserted"><ins><em>some government such as China or the US
     told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>data
       and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
     do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
@@ -3046,9 +3046,7 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
@@ -3056,13 +3054,7 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>companies
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3074,27 +3066,36 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws.</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just 
broadcasts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>unauthorized people.&lt;/p&gt;
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
+    permit security brekaers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
+
+    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>those people/devices can use</em></ins></span> the 
<span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
-    &lt;p&gt;Because of</em></ins></span> the <span 
class="removed"><del><strong>image is coming</strong></del></span> <span 
class="inserted"><ins><em>security flaws, the watch can be 
accessed</em></ins></span> from <span class="inserted"><ins><em>unauthorized 
people/devices and those people/devices can use</em></ins></span> the <span 
class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>watch to 
send messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>word &ldquo;&lt;a
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this is a back door, but that could 
be</em></ins></span> a <span class="removed"><del><strong>way to
-    disable the surveillance, even if it were not hidden 
as</strong></del></span>
-    <span class="inserted"><ins><em>misunderstanding.  
However,</em></ins></span> it <span class="removed"><del><strong>was in
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="inserted"><ins><em>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence 
of</strong></del></span> a <span class="removed"><del><strong>way to
+    disable the surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>back door, but that 
could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>was in
     these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -3845,7 +3846,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary-surveillance.de.po      16 Oct 2020 14:33:57 -0000      1.346
+++ proprietary-surveillance.de.po      16 Oct 2020 15:02:46 -0000      1.347
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4783,8 +4783,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-surveillance.es.po      16 Oct 2020 14:33:57 -0000      1.86
+++ proprietary-surveillance.es.po      16 Oct 2020 15:02:46 -0000      1.87
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-10-08 10:33+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -4250,8 +4250,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.545
retrieving revision 1.546
diff -u -b -r1.545 -r1.546
--- proprietary-surveillance.fr.po      16 Oct 2020 14:33:57 -0000      1.545
+++ proprietary-surveillance.fr.po      16 Oct 2020 15:02:46 -0000      1.546
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-10-16 14:30+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -4257,8 +4257,9 @@
 # | people (specially children's)  privacy. In addition, they have a lot of
 # | security flaws. <a
 # | 
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
-# | permit access by security breakers</a> and unauthorized [-people, and can
-# | send messages from unauthorized devices.-] {+people.+}
+# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | unauthorized [-people, and can send messages from unauthorized devices.-]
+# | {+people) to access</a> the watch.+}
 #, fuzzy
 #| msgid ""
 #| "Internet-enabled watches with proprietary software are malware, violating "
@@ -4270,8 +4271,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 "Les montres connectées utilisant du logiciel privateur sont des objets "
 "malfaisants, car elles violent la vie privée des gens et en particulier des "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary-surveillance.it-diff.html       16 Oct 2020 14:33:57 -0000      
1.198
+++ proprietary-surveillance.it-diff.html       16 Oct 2020 15:02:46 -0000      
1.199
@@ -2938,7 +2938,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -3634,7 +3634,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.358
retrieving revision 1.359
diff -u -b -r1.358 -r1.359
--- proprietary-surveillance.it.po      16 Oct 2020 14:33:57 -0000      1.358
+++ proprietary-surveillance.it.po      16 Oct 2020 15:02:46 -0000      1.359
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4499,8 +4499,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary-surveillance.ja-diff.html       16 Oct 2020 14:33:57 -0000      
1.216
+++ proprietary-surveillance.ja-diff.html       16 Oct 2020 15:02:46 -0000      
1.217
@@ -2552,11 +2552,9 @@
     way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
 
     &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+      you.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -2564,87 +2562,91 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that</em></ins></span> the user <span 
class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="inserted"><ins><em>sends
+    recordings</em></ins></span> made <span 
class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>without 
a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>e-reader used</strong></del></span> 
<span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, where 
they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span class="inserted"><ins><em>advertising companies and government 
agencies. In other words,
+    deleting the collected information doesn't cancel the 
wrong</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not</strong></del></span> 
<span class="inserted"><ins><em>other servers&lt;/a&gt;, where they can be 
accessed by
-    advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span>
+    <span class="inserted"><ins><em>collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not</em></ins></span> only <span 
class="inserted"><ins><em>in</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>present, but in the past (and, who knows,
+    the devices are tethered to. Moreover, they</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>made available to
+    Alexa. As a result, Amazon</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
+    voice assistants</em></ins></span> do <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff</em></ins></span> even 
<span class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even</em></ins></span> has <span 
class="inserted"><ins><em>access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>client 
program is nonfree, and data processing is done
-    &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in</em></ins></span>
-    the <span class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span> <span 
class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing 
way</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>saying &ldquo;We won't
-    tell you how and where</em></ins></span> it's
-      <span class="removed"><del><strong>needed</strong></del></span> <span 
class="inserted"><ins><em>done&rdquo;), users have no way</em></ins></span>
-    to <span class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>know what happens to 
the recordings unless human eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have</em></ins></span> no 
<span class="removed"><del><strong>authentication when
+    accessed through</strong></del></span> <span class="inserted"><ins><em>way
+    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>recordings unless 
human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
     paying</em></ins></span> for
     <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>the 
subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
@@ -2740,18 +2742,18 @@
     &lt;p&gt;Internet-enabled watches with</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span>
     are <span class="removed"><del><strong>an
       intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>malware, violating people (specially children's)
-    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>security flaws. &lt;a
+    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>unauthorized people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>security flaws,</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Because of</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>watch can be accessed from unauthorized 
people/devices and those people/devices can use</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>security flaws,</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>watch can be 
accessed from unauthorized people/devices</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>those people/devices can use</em></ins></span> the 
<span class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3453,7 +3455,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary-surveillance.ja.po      16 Oct 2020 14:33:57 -0000      1.340
+++ proprietary-surveillance.ja.po      16 Oct 2020 15:02:46 -0000      1.341
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3558,8 +3558,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary-surveillance.pot        16 Oct 2020 14:33:57 -0000      1.279
+++ proprietary-surveillance.pot        16 Oct 2020 15:02:46 -0000      1.280
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2868,7 +2868,7 @@
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a "
 
"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
 "
-"permit access by security breakers</a> and unauthorized people."
+"permit security brekaers (and unauthorized people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.635
retrieving revision 1.636
diff -u -b -r1.635 -r1.636
--- proprietary-surveillance.ru.po      16 Oct 2020 14:33:57 -0000      1.635
+++ proprietary-surveillance.ru.po      16 Oct 2020 15:02:46 -0000      1.636
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -4213,8 +4213,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary.de-diff.html    16 Oct 2020 14:33:57 -0000      1.181
+++ proprietary.de-diff.html    16 Oct 2020 15:02:46 -0000      1.182
@@ -217,7 +217,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -319,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary.de.po   16 Oct 2020 14:33:57 -0000      1.221
+++ proprietary.de.po   16 Oct 2020 15:02:46 -0000      1.222
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -458,8 +458,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- proprietary.es.po   16 Oct 2020 14:33:57 -0000      1.326
+++ proprietary.es.po   16 Oct 2020 15:02:47 -0000      1.327
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -316,8 +316,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- proprietary.fr.po   16 Oct 2020 14:33:57 -0000      1.368
+++ proprietary.fr.po   16 Oct 2020 15:02:47 -0000      1.369
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-10-16 14:30+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -312,8 +312,9 @@
 # | people (specially children's)  privacy. In addition, they have a lot of
 # | security flaws. <a
 # | 
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
-# | permit access by security breakers</a> and unauthorized [-people, and can
-# | send messages from unauthorized devices.-] {+people.+}
+# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | unauthorized [-people, and can send messages from unauthorized devices.-]
+# | {+people) to access</a> the watch.+}
 #, fuzzy
 #| msgid ""
 #| "Internet-enabled watches with proprietary software are malware, violating "
@@ -325,8 +326,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 "Les montres connectées utilisant du logiciel privateur sont des objets "
 "malfaisants, car elles violent la vie privée des gens et en particulier des "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary.it-diff.html    16 Oct 2020 14:33:57 -0000      1.193
+++ proprietary.it-diff.html    16 Oct 2020 15:02:47 -0000      1.194
@@ -216,7 +216,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.it.po   16 Oct 2020 14:33:57 -0000      1.230
+++ proprietary.it.po   16 Oct 2020 15:02:47 -0000      1.231
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -462,8 +462,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.ja-diff.html    16 Oct 2020 14:33:57 -0000      1.198
+++ proprietary.ja-diff.html    16 Oct 2020 15:02:47 -0000      1.199
@@ -214,7 +214,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary.ja.po   16 Oct 2020 14:33:57 -0000      1.214
+++ proprietary.ja.po   16 Oct 2020 15:02:47 -0000      1.215
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -323,8 +323,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.nl-diff.html    16 Oct 2020 14:33:57 -0000      1.194
+++ proprietary.nl-diff.html    16 Oct 2020 15:02:47 -0000      1.195
@@ -216,7 +216,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary.nl.po   16 Oct 2020 14:33:58 -0000      1.204
+++ proprietary.nl.po   16 Oct 2020 15:02:47 -0000      1.205
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -366,8 +366,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- proprietary.pl-diff.html    16 Oct 2020 14:33:58 -0000      1.211
+++ proprietary.pl-diff.html    16 Oct 2020 15:02:47 -0000      1.212
@@ -214,7 +214,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:58 $
+$Date: 2020/10/16 15:02:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary.pl.po   16 Oct 2020 14:33:58 -0000      1.197
+++ proprietary.pl.po   16 Oct 2020 15:02:47 -0000      1.198
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -543,8 +543,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.pot     16 Oct 2020 14:33:58 -0000      1.194
+++ proprietary.pot     16 Oct 2020 15:02:47 -0000      1.195
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -261,7 +261,7 @@
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a "
 
"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
 "
-"permit access by security breakers</a> and unauthorized people."
+"permit security brekaers (and unauthorized people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary.pt-br-diff.html 16 Oct 2020 14:33:58 -0000      1.3
+++ proprietary.pt-br-diff.html 16 Oct 2020 15:02:47 -0000      1.4
@@ -200,15 +200,15 @@
     <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, 
so</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
-
-    &lt;p&gt;Because of</em></ins></span> the
+    permit security brekaers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the
     <span class="removed"><del><strong>bosses can spy on them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring</strong></del></span> <span 
class="inserted"><ins><em>security flaws,</em></ins></span> the <span 
class="removed"><del><strong>user's &ldquo;consent&rdquo; is not
+    &lt;p&gt;This shows why requiring</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
+
+    &lt;p&gt;Because of</em></ins></span> the <span 
class="removed"><del><strong>user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
     most workers into consenting to almost anything, even probable exposure
-    to contagious disease that</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> can be <span 
class="removed"><del><strong>fatal.  Software like this should
+    to contagious disease that</strong></del></span> <span 
class="inserted"><ins><em>security flaws, the watch</em></ins></span> can be 
<span class="removed"><del><strong>fatal.  Software like this should
     be illegal</strong></del></span> <span class="inserted"><ins><em>accessed 
from unauthorized people/devices</em></ins></span> and <span 
class="removed"><del><strong>bosses that demand it should</strong></del></span> 
<span class="inserted"><ins><em>those people/devices can use the watch to send 
messages which can</em></ins></span> be <span 
class="removed"><del><strong>prosecuted</strong></del></span> <span 
class="inserted"><ins><em>dangerous</em></ins></span> for <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's privacy.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
@@ -331,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:58 $
+$Date: 2020/10/16 15:02:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary.pt-br.po        16 Oct 2020 14:33:58 -0000      1.329
+++ proprietary.pt-br.po        16 Oct 2020 15:02:47 -0000      1.330
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -314,8 +314,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary.ru.po   16 Oct 2020 14:33:58 -0000      1.402
+++ proprietary.ru.po   16 Oct 2020 15:02:47 -0000      1.403
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -316,8 +316,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.tr.po   16 Oct 2020 14:33:58 -0000      1.61
+++ proprietary.tr.po   16 Oct 2020 15:02:47 -0000      1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-10-07 23:09+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -310,8 +310,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.zh-cn.po        16 Oct 2020 14:33:58 -0000      1.67
+++ proprietary.zh-cn.po        16 Oct 2020 15:02:47 -0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-10-10 13:07+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -292,8 +292,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary.zh-tw-diff.html 16 Oct 2020 14:33:58 -0000      1.174
+++ proprietary.zh-tw-diff.html 16 Oct 2020 15:02:47 -0000      1.175
@@ -217,7 +217,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit access by security breakers&lt;/a&gt; and unauthorized 
people.&lt;/p&gt;
+    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
 
@@ -319,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 14:33:58 $
+$Date: 2020/10/16 15:02:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary.zh-tw.po        16 Oct 2020 14:33:58 -0000      1.184
+++ proprietary.zh-tw.po        16 Oct 2020 15:02:47 -0000      1.185
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -436,8 +436,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- pt-br.po    16 Oct 2020 14:33:58 -0000      1.282
+++ pt-br.po    16 Oct 2020 15:02:47 -0000      1.283
@@ -8744,8 +8744,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.480
retrieving revision 1.481
diff -u -b -r1.480 -r1.481
--- ru.po       16 Oct 2020 14:33:58 -0000      1.480
+++ ru.po       16 Oct 2020 15:02:47 -0000      1.481
@@ -10636,8 +10636,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- tr.po       16 Oct 2020 14:33:58 -0000      1.60
+++ tr.po       16 Oct 2020 15:02:47 -0000      1.61
@@ -7759,8 +7759,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- zh-cn.po    16 Oct 2020 14:33:58 -0000      1.57
+++ zh-cn.po    16 Oct 2020 15:02:47 -0000      1.58
@@ -7532,8 +7532,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- zh-tw.po    16 Oct 2020 14:33:58 -0000      1.218
+++ zh-tw.po    16 Oct 2020 15:02:47 -0000      1.219
@@ -7693,8 +7693,8 @@
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
 "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]