www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Fri, 16 Oct 2020 14:30:50 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/10/16 14:30:49

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.386&r2=1.387
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.546&r2=1.547
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.359&r2=1.360
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.636&r2=1.637
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.369&r2=1.370
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.215&r2=1.216
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.403&r2=1.404
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.481&r2=1.482
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.219&r2=1.220

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- de.po       16 Oct 2020 15:02:45 -0000      1.219
+++ de.po       16 Oct 2020 18:30:45 -0000      1.220
@@ -12254,16 +12254,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- es.po       16 Oct 2020 15:02:45 -0000      1.313
+++ es.po       16 Oct 2020 18:30:45 -0000      1.314
@@ -12161,16 +12161,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.386
retrieving revision 1.387
diff -u -b -r1.386 -r1.387
--- fr.po       16 Oct 2020 15:02:45 -0000      1.386
+++ fr.po       16 Oct 2020 18:30:45 -0000      1.387
@@ -10696,9 +10696,10 @@
 #. type: Content of: <div><ul><li><p>
 # | Internet-enabled watches with proprietary software are malware, violating
 # | people (specially children's)  privacy. In addition, they have a lot of
-# | security flaws. <a
-# | 
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
-# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | security flaws. {+They+} <a
+# | 
[-href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They-]
+# | 
{+href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>+}
+# | permit [-access by-] security [-breakers</a> and-] {+breakers (and+}
 # | unauthorized [-people, and can send messages from unauthorized devices.-]
 # | {+people) to access</a> the watch.+}
 #, fuzzy
@@ -10711,8 +10712,8 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 "Les montres connectées utilisant du logiciel privateur sont des objets "
@@ -10724,9 +10725,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -12179,6 +12180,29 @@
 #~ "Internet-enabled watches with proprietary software are malware, violating "
 #~ "people (specially children's)  privacy. In addition, they have a lot of "
 #~ "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
+#~ "security-vulnerabilities/\">They permit security brekaers (and "
+#~ "unauthorized people) to access</a> the watch."
+#~ msgstr ""
+#~ "Les montres connectées utilisant du logiciel privateur sont des objets "
+#~ "malfaisants, car elles violent la vie privée des gens et en particulier "
+#~ "des enfants. De plus, elles ont un grand nombre de vulnérabilités. <a "
+#~ "href=\"https://www.wired.com/story/kid-smartwatch-security-";
+#~ "vulnerabilities/\">Les briseurs de sécurité y ont accès</a> ainsi que 
des "
+#~ "personnes non autorisées, et elles peuvent communiquer avec des appareils 
"
+#~ "non autorisés."
+
+#, fuzzy
+#~| msgid ""
+#~| "Internet-enabled watches with proprietary software are malware, "
+#~| "violating people (specially children's)  privacy. In addition, they have "
+#~| "a lot of security flaws. <a href=\"https://www.wired.com/story/kid-";
+#~| "smartwatch-security-vulnerabilities/\">They permit access by security "
+#~| "breakers</a> and unauthorized people, and can send messages from "
+#~| "unauthorized devices."
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's)  privacy. In addition, they have a lot of "
+#~ "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
 #~ "security-vulnerabilities/\">They permit access by security breakers</a> "
 #~ "and unauthorized people."
 #~ msgstr ""

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- it.po       16 Oct 2020 15:02:45 -0000      1.219
+++ it.po       16 Oct 2020 18:30:45 -0000      1.220
@@ -11488,16 +11488,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- ja.po       16 Oct 2020 15:02:45 -0000      1.227
+++ ja.po       16 Oct 2020 18:30:46 -0000      1.228
@@ -8955,16 +8955,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- nl.po       16 Oct 2020 15:02:45 -0000      1.220
+++ nl.po       16 Oct 2020 18:30:46 -0000      1.221
@@ -8305,16 +8305,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- pl.po       16 Oct 2020 15:02:45 -0000      1.219
+++ pl.po       16 Oct 2020 18:30:46 -0000      1.220
@@ -7803,16 +7803,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- pot 16 Oct 2020 15:02:45 -0000      1.218
+++ pot 16 Oct 2020 18:30:46 -0000      1.219
@@ -7131,16 +7131,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-surveillance.de-diff.html       16 Oct 2020 15:02:45 -0000      
1.133
+++ proprietary-surveillance.de-diff.html       16 Oct 2020 18:30:46 -0000      
1.134
@@ -2713,38 +2713,69 @@
     software, including videoconference software, to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil</em></ins></span> and <span class="removed"><del><strong>spyware 
via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>monitor staff 
working at home&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>program 
reports
-    whether you are &ldquo;active,&rdquo; that is in effect</em></ins></span> 
a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>malicious
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
     &lt;p&gt;Google Nest &lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
-    is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>taking over 
ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
-    out prematurely and on accident and Google was planning on disclosing
+    out prematurely</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
on <span class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>accident and Google 
was planning on disclosing
     this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
     &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing</em></ins></span> in <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>their</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>devices 
implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also</em></ins></span> used <span 
class="removed"><del><strong>did</strong></del></span> <span 
class="inserted"><ins><em>by their
+    manufacturers for snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is</em></ins></span> not <span class="removed"><del><strong>affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>thousand 
confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>computers&lt;/a&gt;, so the
-    bosses can spy</em></ins></span> on <span class="removed"><del><strong>top 
under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>no
+    way</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2758,19 +2789,18 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>see or control what</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The 
boss</em></ins></span> can <span class="removed"><del><strong>collect the 
emails of members of Parliament</strong></del></span> <span 
class="inserted"><ins><em>coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like</em></ins></span> 
this <span class="removed"><del><strong>way, because they 
pass</strong></del></span> <span class="inserted"><ins><em>should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2784,23 +2814,23 @@
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+      specifically</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2812,42 +2842,14 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>the household
-    through connected surveillance devices.&lt;/p&gt;
-
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant surveillance</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can 
communicate</strong></del></span> <span class="inserted"><ins><em>the devices 
implemented proper
-    security, including encryption. But many devices</em></ins></span> with 
<span class="removed"><del><strong>it,</strong></del></span> <span 
class="inserted"><ins><em>proprietary
-    software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
-    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it</em></ins></span> is <span class="inserted"><ins><em>not supposed 
to listen&lt;/a&gt;. Thus, when one of Google's
-    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>surveillance device. &lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
-    users were easily identified from these recordings.&lt;/p&gt;
-
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>no
-    way to see or control what it records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>Amazon's servers, which store it indefinitely. 
Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    even</em></ins></span> if <span class="removed"><del><strong>its 
manufacturer can communicate with it,
+      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
     the <span class="removed"><del><strong>manufacturer, 
based</strong></del></span> <span class="inserted"><ins><em>data 
remain</em></ins></span> on <span class="inserted"><ins><em>other 
servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
     deleting</em></ins></span> the <span class="removed"><del><strong>fact
@@ -2916,27 +2918,27 @@
     &lt;p&gt;That's easy to do because the system has no authentication when
     accessed through the modem.  However, even if it asked for
     authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>result, 
Amazon</em></ins></span> has <span class="removed"><del><strong>no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
-    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
+    access.  The software in the car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
+    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
+    in</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
@@ -2980,7 +2982,7 @@
       store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And</em></ins></span> if <span 
class="removed"><del><strong>the state orders it</strong></del></span> <span 
class="inserted"><ins><em>some government such as China or the US
+    easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
     told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>data
       and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
     do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
@@ -3046,7 +3048,9 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
@@ -3054,7 +3058,13 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3066,36 +3076,27 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
-
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>those people/devices can use</em></ins></span> the 
<span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. 
They</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and 
<span class="removed"><del><strong>cable&lt;/a&gt;. Even if the image is 
coming</strong></del></span> from the <span class="removed"><del><strong>user's 
own
+    computer,</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>child.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="inserted"><ins><em>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence 
of</strong></del></span> a <span class="removed"><del><strong>way to
-    disable the surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>back door, but that 
could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>was in
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is a back door, but that could 
be</em></ins></span> a <span class="removed"><del><strong>way to
+    disable the surveillance, even if it were not hidden 
as</strong></del></span>
+    <span class="inserted"><ins><em>misunderstanding.  
However,</em></ins></span> it <span class="removed"><del><strong>was in
     these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -3846,7 +3847,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:45 $
+$Date: 2020/10/16 18:30:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary-surveillance.de.po      16 Oct 2020 15:02:46 -0000      1.347
+++ proprietary-surveillance.de.po      16 Oct 2020 18:30:46 -0000      1.348
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4782,16 +4782,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-surveillance.es.po      16 Oct 2020 15:02:46 -0000      1.87
+++ proprietary-surveillance.es.po      16 Oct 2020 18:30:46 -0000      1.88
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-10-08 10:33+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -4249,16 +4249,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.546
retrieving revision 1.547
diff -u -b -r1.546 -r1.547
--- proprietary-surveillance.fr.po      16 Oct 2020 15:02:46 -0000      1.546
+++ proprietary-surveillance.fr.po      16 Oct 2020 18:30:46 -0000      1.547
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-10-16 14:30+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -4255,9 +4255,10 @@
 #. type: Content of: <div><div><ul><li><p>
 # | Internet-enabled watches with proprietary software are malware, violating
 # | people (specially children's)  privacy. In addition, they have a lot of
-# | security flaws. <a
-# | 
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
-# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | security flaws. {+They+} <a
+# | 
[-href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They-]
+# | 
{+href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>+}
+# | permit [-access by-] security [-breakers</a> and-] {+breakers (and+}
 # | unauthorized [-people, and can send messages from unauthorized devices.-]
 # | {+people) to access</a> the watch.+}
 #, fuzzy
@@ -4270,8 +4271,8 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 "Les montres connectées utilisant du logiciel privateur sont des objets "
@@ -4283,9 +4284,9 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary-surveillance.it-diff.html       16 Oct 2020 15:02:46 -0000      
1.199
+++ proprietary-surveillance.it-diff.html       16 Oct 2020 18:30:46 -0000      
1.200
@@ -2936,11 +2936,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -3634,7 +3634,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:46 $
+$Date: 2020/10/16 18:30:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- proprietary-surveillance.it.po      16 Oct 2020 15:02:46 -0000      1.359
+++ proprietary-surveillance.it.po      16 Oct 2020 18:30:47 -0000      1.360
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4498,16 +4498,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.ja-diff.html       16 Oct 2020 15:02:46 -0000      
1.217
+++ proprietary-surveillance.ja-diff.html       16 Oct 2020 18:30:47 -0000      
1.218
@@ -2342,17 +2342,17 @@
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2384,15 +2384,10 @@
     user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in</strong></del></span>
+puts</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; 
to</em></ins></span> its <span class="removed"><del><strong>own 
malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
@@ -2415,7 +2410,12 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2552,9 +2552,11 @@
     way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
 
     &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -2562,91 +2564,84 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that</em></ins></span> the user <span 
class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings</em></ins></span> made <span 
class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>without 
a legitimate prompt), and sends
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="inserted"><ins><em>sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>e-reader used</strong></del></span> 
<span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, where 
they can be accessed</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-    <span class="inserted"><ins><em>advertising companies and government 
agencies. In other words,
-    deleting the collected information doesn't cancel the 
wrong</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span>
-    <span class="inserted"><ins><em>collecting it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, 
where</em></ins></span> they <span class="removed"><del><strong>report even 
which page</strong></del></span> <span class="inserted"><ins><em>can be 
accessed by
+    advertising companies and government agencies. In other words,
+    deleting</em></ins></span> the <span class="removed"><del><strong>user 
reads</strong></del></span> <span class="inserted"><ins><em>collected 
information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' 
life</em></ins></span>
+    at <span class="removed"><del><strong>what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>home, not only in the present, but in the past (and, 
who knows,
+    in the future too?)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>made available to
-    Alexa. As a result, Amazon</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
-    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
 
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
-    voice assistants</em></ins></span> do <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>similar things.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even</em></ins></span> has <span 
class="inserted"><ins><em>access to &lt;a
+    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service staff even has 
access</em></ins></span> to <span class="removed"><del><strong>Adobe&lt;/a&gt;. 
 Adobe's &ldquo;excuse&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have</em></ins></span> no 
<span class="removed"><del><strong>authentication when
-    accessed through</strong></del></span> <span class="inserted"><ins><em>way
-    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>recordings unless 
human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    tell you how and where</em></ins></span> it's
+      <span class="removed"><del><strong>needed</strong></del></span> <span 
class="inserted"><ins><em>done&rdquo;), users have no way</em></ins></span>
+    to <span class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>know what happens to 
the recordings unless human eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>user is still
     paying</em></ins></span> for
     <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>the 
subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
@@ -2742,20 +2737,20 @@
     &lt;p&gt;Internet-enabled watches with</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span>
     are <span class="removed"><del><strong>an
       intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>malware, violating people (specially children's)
-    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>watch.&lt;/p&gt;
-
-    &lt;p&gt;Because of</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>security flaws,</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>watch can be 
accessed from unauthorized people/devices</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>those people/devices can use</em></ins></span> the 
<span class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to and 
from</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>watch, possibly endangering</em></ins></span> 
the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>extract data remotely and
+      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>mean 
&ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603020"&gt;
@@ -3455,7 +3450,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:46 $
+$Date: 2020/10/16 18:30:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary-surveillance.ja.po      16 Oct 2020 15:02:46 -0000      1.341
+++ proprietary-surveillance.ja.po      16 Oct 2020 18:30:47 -0000      1.342
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3557,16 +3557,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary-surveillance.pot        16 Oct 2020 15:02:46 -0000      1.280
+++ proprietary-surveillance.pot        16 Oct 2020 18:30:47 -0000      1.281
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2866,16 +2866,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a "
-"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
 "
-"permit security brekaers (and unauthorized people) to access</a> the watch."
+"security flaws. They <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>
 "
+"permit security breakers (and unauthorized people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.636
retrieving revision 1.637
diff -u -b -r1.636 -r1.637
--- proprietary-surveillance.ru.po      16 Oct 2020 15:02:46 -0000      1.636
+++ proprietary-surveillance.ru.po      16 Oct 2020 18:30:47 -0000      1.637
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -4212,16 +4212,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.de-diff.html    16 Oct 2020 15:02:46 -0000      1.182
+++ proprietary.de-diff.html    16 Oct 2020 18:30:47 -0000      1.183
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -215,11 +215,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -319,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:46 $
+$Date: 2020/10/16 18:30:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- proprietary.de.po   16 Oct 2020 15:02:46 -0000      1.222
+++ proprietary.de.po   16 Oct 2020 18:30:47 -0000      1.223
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -457,16 +457,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- proprietary.es.po   16 Oct 2020 15:02:47 -0000      1.327
+++ proprietary.es.po   16 Oct 2020 18:30:47 -0000      1.328
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -315,16 +315,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.369
retrieving revision 1.370
diff -u -b -r1.369 -r1.370
--- proprietary.fr.po   16 Oct 2020 15:02:47 -0000      1.369
+++ proprietary.fr.po   16 Oct 2020 18:30:48 -0000      1.370
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-10-16 14:30+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -310,9 +310,10 @@
 #. type: Content of: <div><ul><li><p>
 # | Internet-enabled watches with proprietary software are malware, violating
 # | people (specially children's)  privacy. In addition, they have a lot of
-# | security flaws. <a
-# | 
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
-# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | security flaws. {+They+} <a
+# | 
[-href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They-]
+# | 
{+href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>+}
+# | permit [-access by-] security [-breakers</a> and-] {+breakers (and+}
 # | unauthorized [-people, and can send messages from unauthorized devices.-]
 # | {+people) to access</a> the watch.+}
 #, fuzzy
@@ -325,8 +326,8 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 "Les montres connectées utilisant du logiciel privateur sont des objets "
@@ -338,9 +339,9 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.it-diff.html    16 Oct 2020 15:02:47 -0000      1.194
+++ proprietary.it-diff.html    16 Oct 2020 18:30:48 -0000      1.195
@@ -58,8 +58,9 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -214,11 +214,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary.it.po   16 Oct 2020 15:02:47 -0000      1.231
+++ proprietary.it.po   16 Oct 2020 18:30:48 -0000      1.232
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -461,16 +461,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary.ja-diff.html    16 Oct 2020 15:02:47 -0000      1.199
+++ proprietary.ja-diff.html    16 Oct 2020 18:30:48 -0000      1.200
@@ -55,8 +55,8 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -154,9 +154,9 @@
   &lt;/td&gt;
   &lt;td&gt;
    &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -212,11 +212,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.215
retrieving revision 1.216
diff -u -b -r1.215 -r1.216
--- proprietary.ja.po   16 Oct 2020 15:02:47 -0000      1.215
+++ proprietary.ja.po   16 Oct 2020 18:30:48 -0000      1.216
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -322,16 +322,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary.nl-diff.html    16 Oct 2020 15:02:47 -0000      1.195
+++ proprietary.nl-diff.html    16 Oct 2020 18:30:48 -0000      1.196
@@ -58,8 +58,9 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -214,11 +214,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.nl.po   16 Oct 2020 15:02:47 -0000      1.205
+++ proprietary.nl.po   16 Oct 2020 18:30:48 -0000      1.206
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -365,16 +365,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.pl-diff.html    16 Oct 2020 15:02:47 -0000      1.212
+++ proprietary.pl-diff.html    16 Oct 2020 18:30:48 -0000      1.213
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of September, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 540 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>September, 2020, the pages in this directory 
list around 450
+instances of malicious functionalities (with more than 540 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -155,16 +155,16 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -186,10 +186,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -212,11 +212,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -316,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.pl.po   16 Oct 2020 15:02:47 -0000      1.198
+++ proprietary.pl.po   16 Oct 2020 18:30:48 -0000      1.199
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -542,16 +542,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary.pot     16 Oct 2020 15:02:47 -0000      1.195
+++ proprietary.pot     16 Oct 2020 18:30:48 -0000      1.196
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -259,16 +259,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a "
-"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>They
 "
-"permit security brekaers (and unauthorized people) to access</a> the watch."
+"security flaws. They <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\";>
 "
+"permit security breakers (and unauthorized people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary.pt-br-diff.html 16 Oct 2020 15:02:47 -0000      1.4
+++ proprietary.pt-br-diff.html 16 Oct 2020 18:30:48 -0000      1.5
@@ -188,30 +188,29 @@
   &lt;li <span class="removed"><del><strong>id="M202007010"&gt;
     &lt;p&gt;BMW will remotely &lt;a
     href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
-    enable and disable functionality in cars&lt;/a&gt; 
through</strong></del></span> <span 
class="inserted"><ins><em>id="M202009100"&gt;
-    &lt;p&gt;Internet-enabled watches with proprietary software
-    are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>universal
+    enable and disable functionality in cars&lt;/a&gt; through a universal
     back door.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that 
bosses</strong></del></span> <span class="inserted"><ins><em>lot of security 
flaws.</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, 
so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the
-    <span class="removed"><del><strong>bosses can spy on them.&lt;/p&gt;
-
-    &lt;p&gt;This shows why requiring</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
-
-    &lt;p&gt;Because of</em></ins></span> the <span 
class="removed"><del><strong>user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that</strong></del></span> <span 
class="inserted"><ins><em>security flaws, the watch</em></ins></span> can be 
<span class="removed"><del><strong>fatal.  Software like this should
-    be illegal</strong></del></span> <span class="inserted"><ins><em>accessed 
from unauthorized people/devices</em></ins></span> and <span 
class="removed"><del><strong>bosses that demand it should</strong></del></span> 
<span class="inserted"><ins><em>those people/devices can use the watch to send 
messages which can</em></ins></span> be <span 
class="removed"><del><strong>prosecuted</strong></del></span> <span 
class="inserted"><ins><em>dangerous</em></ins></span> for <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's privacy.&lt;/p&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital</strong></del></span> <span 
class="inserted"><ins><em>id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)</em></ins></span>
+    privacy.  <span class="removed"><del><strong>The 
boss</strong></del></span> <span class="inserted"><ins><em>In addition, they 
have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people</em></ins></span> can 
<span class="removed"><del><strong>coerce
+    most workers into consenting to almost anything, even probable 
exposure</strong></del></span> <span class="inserted"><ins><em>intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>contagious disease that can be fatal.  
Software like this should
+    be illegal</strong></del></span> and <span 
class="removed"><del><strong>bosses</strong></del></span> <span 
class="inserted"><ins><em>from the watch, possibly endangering the 
child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>demand it should be prosecuted for 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>this 
article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -331,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary.pt-br.po        16 Oct 2020 15:02:47 -0000      1.330
+++ proprietary.pt-br.po        16 Oct 2020 18:30:48 -0000      1.331
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -313,16 +313,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.403
retrieving revision 1.404
diff -u -b -r1.403 -r1.404
--- proprietary.ru.po   16 Oct 2020 15:02:47 -0000      1.403
+++ proprietary.ru.po   16 Oct 2020 18:30:48 -0000      1.404
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -315,16 +315,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.tr.po   16 Oct 2020 15:02:47 -0000      1.62
+++ proprietary.tr.po   16 Oct 2020 18:30:48 -0000      1.63
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-10-07 23:09+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -309,16 +309,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary.zh-cn.po        16 Oct 2020 15:02:47 -0000      1.68
+++ proprietary.zh-cn.po        16 Oct 2020 18:30:48 -0000      1.69
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-10-10 13:07+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -291,16 +291,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.zh-tw-diff.html 16 Oct 2020 15:02:47 -0000      1.175
+++ proprietary.zh-tw-diff.html 16 Oct 2020 18:30:48 -0000      1.176
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -188,10 +188,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -215,11 +215,11 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;They
-    permit security brekaers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Because of the security flaws, the watch can be accessed from 
unauthorized people/devices and those people/devices can use the watch to send 
messages which can be dangerous for people's privacy.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -319,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.zh-tw.po        16 Oct 2020 15:02:47 -0000      1.185
+++ proprietary.zh-tw.po        16 Oct 2020 18:30:48 -0000      1.186
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -435,16 +435,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- pt-br.po    16 Oct 2020 15:02:47 -0000      1.283
+++ pt-br.po    16 Oct 2020 18:30:48 -0000      1.284
@@ -8743,16 +8743,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.481
retrieving revision 1.482
diff -u -b -r1.481 -r1.482
--- ru.po       16 Oct 2020 15:02:47 -0000      1.481
+++ ru.po       16 Oct 2020 18:30:48 -0000      1.482
@@ -10635,16 +10635,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- tr.po       16 Oct 2020 15:02:47 -0000      1.61
+++ tr.po       16 Oct 2020 18:30:48 -0000      1.62
@@ -7758,16 +7758,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- zh-cn.po    16 Oct 2020 15:02:47 -0000      1.58
+++ zh-cn.po    16 Oct 2020 18:30:48 -0000      1.59
@@ -7531,16 +7531,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- zh-tw.po    16 Oct 2020 15:02:47 -0000      1.219
+++ zh-tw.po    16 Oct 2020 18:30:48 -0000      1.220
@@ -7692,16 +7692,16 @@
 msgid ""
 "Internet-enabled watches with proprietary software are malware, violating "
 "people (specially children's)  privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-";
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-";
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
 "people) to access</a> the watch."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]