www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 2 Nov 2020 10:03:02 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/02 10:03:01

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.393&r2=1.394
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.349&r2=1.350
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.551&r2=1.552
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.361&r2=1.362
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.343&r2=1.344
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.639&r2=1.640
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.374&r2=1.375
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.215&r2=1.216
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.410&r2=1.411
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.490&r2=1.491
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.223&r2=1.224

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- de.po       2 Nov 2020 11:01:43 -0000       1.223
+++ de.po       2 Nov 2020 15:02:53 -0000       1.224
@@ -7273,6 +7273,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -12391,16 +12401,6 @@
 "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
 "to-avoid#Monetize\">„monetarisieren“</a> verwendet."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -13446,6 +13446,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- es.po       2 Nov 2020 11:01:43 -0000       1.319
+++ es.po       2 Nov 2020 15:02:53 -0000       1.320
@@ -7080,6 +7080,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -12376,22 +12386,6 @@
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "
 "gratuito.)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Muchos empresarios están utilizando software privativo, incluido software de 
"
-"videoconferencia, para <a href=\"https://www.theguardian.com/world/2020/";
-"sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
-"surveillance\">vigilar y monitorizar el trabajo de los empleados en casa</"
-"a>. Si el programa informa de si la persona está «activa», esa es en 
efecto "
-"una característica maliciosa de vigilancia."
-
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -13445,6 +13439,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"Muchos empresarios están utilizando software privativo, incluido software de 
"
+"videoconferencia, para <a href=\"https://www.theguardian.com/world/2020/";
+"sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+"surveillance\">vigilar y monitorizar el trabajo de los empleados en casa</"
+"a>. Si el programa informa de si la persona está «activa», esa es en 
efecto "
+"una característica maliciosa de vigilancia."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.393
retrieving revision 1.394
diff -u -b -r1.393 -r1.394
--- fr.po       2 Nov 2020 11:01:43 -0000       1.393
+++ fr.po       2 Nov 2020 15:02:53 -0000       1.394
@@ -6164,6 +6164,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -10741,22 +10751,6 @@
 "to-avoid.html#Hacker\">hackers</a> » pour désigner des pirates 
informatiques "
 "– aussi appelés crackers.)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"De nombreux employeurs utilisent du logiciel non libre, de vidéo-conférence 
"
-"en particulier, pour <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\">surveiller et vérifier le télétravail de leurs collaborateurs</a>. "
-"Lorsqu'un programme rapporte si on est « actif » ou non, il contient en 
fait "
-"une fonctionnalité malveillante."
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -11657,6 +11651,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"De nombreux employeurs utilisent du logiciel non libre, de vidéo-conférence 
"
+"en particulier, pour <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\">surveiller et vérifier le télétravail de leurs collaborateurs</a>. "
+"Lorsqu'un programme rapporte si on est « actif » ou non, il contient en 
fait "
+"une fonctionnalité malveillante."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- it.po       2 Nov 2020 11:01:44 -0000       1.223
+++ it.po       2 Nov 2020 15:02:55 -0000       1.224
@@ -6787,6 +6787,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -11537,16 +11547,6 @@
 "&rdquo;)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -12588,6 +12588,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- ja.po       2 Nov 2020 11:01:44 -0000       1.231
+++ ja.po       2 Nov 2020 15:02:55 -0000       1.232
@@ -5298,6 +5298,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -9004,16 +9014,6 @@
 "&rdquo;)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -9899,6 +9899,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-microsoft.de-diff.html      17 Oct 2020 08:05:07 -0000      1.54
+++ malware-microsoft.de-diff.html      2 Nov 2020 15:02:55 -0000       1.55
@@ -452,12 +452,11 @@
     &lt;p&gt;Once</em></ins></span> Microsoft has tricked a user
     into accepting installation of Windows 10, &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</em></ins></span>
-    find that they are denied the option to cancel or even postpone the
-    imposed date of <span class="removed"><del><strong>installation&lt;/a&gt;.
-   &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
+    find that they are denied <span class="removed"><del><strong>the option to 
cancel or even postpone the
+   imposed date of installation&lt;/a&gt;.
+   &lt;/p&gt;
     &lt;p&gt;This demonstrates what we've said for years: using proprietary
-    software means letting someone have <span 
class="removed"><del><strong>power over you, and you're
+   software means letting someone have power over you, and you're
    going to get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
@@ -473,27 +472,31 @@
   &lt;/p&gt;
   &lt;p&gt;Free software developers also stop maintaining old versions of
   their programs, but this is not unfair to users because the
-  users of free software have control</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> over <span 
class="removed"><del><strong>it.  If it is important
-  enough to</strong></del></span> you, <span 
class="removed"><del><strong>you</strong></del></span> and <span 
class="removed"><del><strong>other users can hire someone to support
+  users of free software have control over it.  If it is important
+  enough to you, you and other users can hire someone to support
   the old version on your future platforms.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
     is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     forcibly pushing Windows
-    update</strong></del></span> <span class="inserted"><ins><em>you're 
going</em></ins></span>
-    to <span class="removed"><del><strong>its version 10&lt;/a&gt;, ignoring 
the flag on Windows 7</strong></del></span> <span class="inserted"><ins><em>get 
screwed sooner</em></ins></span> or <span class="removed"><del><strong>8
-    that you could set</strong></del></span> <span 
class="inserted"><ins><em>later.&lt;/p&gt;
+    update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
+    that you could set</strong></del></span> <span 
class="inserted"><ins><em>the option</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms</strong></del></span> 
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the 
<span class="removed"><del><strong>presence</strong></del></span>
+    <span class="inserted"><ins><em>imposed date</em></ins></span> of
+    <span class="removed"><del><strong>a &lt;a 
href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you,</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>you're going
+    to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
     &lt;p&gt;FTDI's proprietary driver
-    for its USB-to-serial chips has been designed</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms the presence of
-    a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;universal
-    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
+    for its USB-to-serial chips has been designed to &lt;a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
     so that they no longer work. Microsoft is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
@@ -539,44 +542,75 @@
     &lt;p&gt;A person or company has the right to cease to work on a particular
     program; the wrong here is Microsoft does this after having made the
     users dependent on Microsoft, because they are not free to ask anyone
-    else to work on the program <span class="removed"><del><strong>for 
them.&lt;/p&gt;&lt;/li&gt;
+    else to work on the program for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
 
 &lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+for</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306220"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
+    informs</em></ins></span> the <span class="removed"><del><strong>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples of Microsoft committing
 interference.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Microsoft is planning to make Windows &lt;a
       
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
-      impose use of its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The reason Microsoft can force things on users is that Windows is
+      impose use</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> of <span 
class="removed"><del><strong>its browser, Edge,</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in <span 
class="removed"><del><strong>certain circumstances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The reason Microsoft can force things on users is 
that</strong></del></span> Windows <span class="removed"><del><strong>is
       nonfree.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Windows displays
-      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+  &lt;li&gt;&lt;p&gt;Windows displays</strong></del></span> <span 
class="inserted"><ins><em>before fixing them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201507150"&gt;
+    &lt;p&gt;Microsoft Office forces users</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
        intrusive ads for Microsoft products and its
        partners' products&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;The article's author starts from the premise that Microsoft
-      has a right to control what Windows does to users, as long as it
+      has a right</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    subscribe</em></ins></span> to <span class="removed"><del><strong>control 
what Windows does</strong></del></span> <span class="inserted"><ins><em>Office 
365</em></ins></span> to <span class="removed"><del><strong>users, as long as it
       doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
 
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
-      annoying advertisements inside of the File Explorer&lt;/a&gt; to nag
-      users to buy subscriptions for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
+      annoying advertisements inside of the File 
Explorer&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>be 
able</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
+    users to <span class="removed"><del><strong>buy subscriptions for the 
OneDrive service.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;In order to increase Windows 10's install base, Microsoft
+&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>create an account on their network&lt;/a&gt; to be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's</strong></del></span> install <span class="removed"><del><strong>base, 
Microsoft
 &lt;a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice and privacy&lt;/a&gt;.
-&lt;/li&gt;
+blatantly disregards user choice</strong></del></span>
+    and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>use the Windows operating system, which is malware. 
The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
 
-&lt;li&gt;&lt;p&gt;Microsoft has
-started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
-users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded</em></ins></span> users <span 
class="removed"><del><strong>obnoxiously</strong></del></span> <span 
class="inserted"><ins><em>of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
       &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
@@ -585,49 +619,27 @@
 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
 into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed 
by</strong></del></span> <span class="inserted"><ins><em>for them.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
+company's
+sysadmins</strong></del></span> <span 
class="inserted"><ins><em>had</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+users to complain</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen</em></ins></span> to the <span 
class="removed"><del><strong>sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201306220"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
-    informs</em></ins></span> the
-<span class="removed"><del><strong>company's
-sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue</strong></del></span>
 <span class="inserted"><ins><em>NSA of bugs in Windows before fixing 
them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201507150"&gt;
-    &lt;p&gt;Microsoft Office forces</em></ins></span> users <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>the sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to <span 
class="removed"><del><strong>Windows
-10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;li id="M201908151"&gt;
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Microsoft 
Surveillance&lt;/h3&gt;
+&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
 
 &lt;ul&gt;
 
-&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
-    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
+&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>say whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
@@ -991,7 +1003,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/02 15:02:55 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- malware-microsoft.de.po     17 Oct 2020 08:05:07 -0000      1.150
+++ malware-microsoft.de.po     2 Nov 2020 15:02:55 -0000       1.151
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -972,6 +972,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- malware-microsoft.es.po     17 Oct 2020 12:00:47 -0000      1.176
+++ malware-microsoft.es.po     2 Nov 2020 15:02:55 -0000       1.177
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -773,6 +774,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- malware-microsoft.fr.po     17 Oct 2020 08:29:20 -0000      1.192
+++ malware-microsoft.fr.po     2 Nov 2020 15:02:55 -0000       1.193
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -771,6 +772,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-microsoft.it-diff.html      17 Oct 2020 08:05:07 -0000      1.53
+++ malware-microsoft.it-diff.html      2 Nov 2020 15:02:55 -0000       1.54
@@ -396,8 +396,7 @@
 
   &lt;li&gt;&lt;p&gt;Microsoft
     is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
-    forcibly pushing Windows
-    update to its version 10&lt;/a&gt;, ignoring</strong></del></span> <span 
class="inserted"><ins><em>platforms.&lt;/p&gt;
+    forcibly pushing</strong></del></span> <span 
class="inserted"><ins><em>platforms.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -405,7 +404,7 @@
 &lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
 &lt;p&gt;The wrongs in this section are not precisely malware, since they do
-not involve making</em></ins></span> the <span 
class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>program that runs in a way that hurts the user.
+not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Microsoft
 actions that harm the users of specific Microsoft software.&lt;/p&gt;
 
@@ -414,23 +413,22 @@
     &lt;p&gt;Microsoft has been  &lt;a
     
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
     force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>computers running certain
-    versions of</em></ins></span> Windows <span class="removed"><del><strong>7 
or 8
-    that you could set</strong></del></span> <span 
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means &lt;a
+    program&lt;/a&gt; on computers running certain
+    versions of</em></ins></span> Windows
+    <span class="removed"><del><strong>update</strong></del></span> <span 
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means &lt;a
     
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, 
notably</em></ins></span> to <span class="removed"><del><strong>not upgrade.  
This reaffirms</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;repair&rdquo; any components 
of</em></ins></span> the <span 
class="removed"><del><strong>presence</strong></del></span> <span 
class="inserted"><ins><em>updating system that users
+    tampering with users' settings and files&lt;/a&gt;, 
notably</em></ins></span> to <span class="removed"><del><strong>its version 
10&lt;/a&gt;, ignoring</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;repair&rdquo; any components 
of</em></ins></span> the <span 
class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some</em></ins></span> of 
<span class="inserted"><ins><em>which &lt;a
+    users' machines, causing numerous problems, some of which &lt;a
     
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
     critical&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This exemplifies the arrogant and manipulative attitude
     that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate 
to</em></ins></span> a &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;universal
-    back door in Windows&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/distros/free-distros.html"&gt;free 
operating system&lt;/a&gt; if you
+    toward the people they are supposedly serving. Migrate to a &lt;a
+    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
     can!&lt;/p&gt;
 
     &lt;p&gt;If your employer makes you run Windows, tell the financial
@@ -439,69 +437,53 @@
   &lt;/li&gt;
 
   &lt;li id="M201704194"&gt;
-    &lt;p&gt;Microsoft has made Windows</em></ins></span> 7
-    and <span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
-      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
-      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;
-  Microsoft is</strong></del></span> <span class="inserted"><ins><em>8 cease 
to function on certain new computers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
-  repeatedly nagging many users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
-    forcing their owners to switch</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Microsoft has made Windows 7
+    and 8 cease to function</em></ins></span> on <span 
class="inserted"><ins><em>certain new computers, &lt;a
+    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
+    forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704134"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+    has dropped support for</em></ins></span> Windows 7 <span 
class="removed"><del><strong>or</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> 8 <span 
class="inserted"><ins><em>on recent processors&lt;/a&gt;
     in a big hurry.&lt;/p&gt;
 
-    &lt;p&gt;It makes no difference what legitimate reasons</em></ins></span> 
Microsoft <span class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>might
-    have</em></ins></span> for <span class="removed"><del><strong>months &lt;a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
-tricking</strong></del></span> <span class="inserted"><ins><em>not doing work 
to support them. If it doesn't want to do
-    this work, it should let</em></ins></span> users <span 
class="removed"><del><strong>into &ldquo;upgrading&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>do the work.&lt;/p&gt;
+    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606270"&gt;
-    &lt;p id="windows10-forcing"&gt;In its efforts</em></ins></span> to <span 
class="inserted"><ins><em>trick users of</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;, if they
-failed to notice</strong></del></span>
-    <span class="inserted"><ins><em>7</em></ins></span> and <span 
class="removed"><del><strong>say no.
-&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;</strong></del></span>
 <span class="inserted"><ins><em>8 into installing all-spying Windows 10 
against their
-    will,</em></ins></span> Microsoft <span 
class="removed"><del><strong>informs</strong></del></span> <span 
class="inserted"><ins><em>forced their computers to &lt;a
+    &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
+    will, Microsoft forced their computers to &lt;a
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
-    silently download&hellip;</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>whole</em></ins></span> of <span 
class="removed"><del><strong>bugs</strong></del></span> <span 
class="inserted"><ins><em>Windows 10&lt;/a&gt;! Apparently,
+    silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
     this was done through a &lt;a
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    jeopardize important operations</em></ins></span> in <span 
class="inserted"><ins><em>regions of the world with poor
+    jeopardize important operations in regions of the world with poor
     connectivity&lt;/a&gt;, but many of the people who let installation proceed
-    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
+    found out</em></ins></span> that <span class="removed"><del><strong>you 
could set</strong></del></span> <span class="inserted"><ins><em>this 
&ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606010"&gt;
     &lt;p&gt;Once Microsoft has tricked a user
-    into accepting installation of</em></ins></span> Windows <span 
class="removed"><del><strong>before fixing them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>10, &lt;a
+    into accepting installation of Windows 10, &lt;a
     
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that they are denied the option to cancel or even postpone the
-    imposed date of installation&lt;/a&gt;.&lt;/p&gt;
+    find that they are denied the option</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms</strong></del></span> 
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the 
<span class="removed"><del><strong>presence</strong></del></span>
+    <span class="inserted"><ins><em>imposed date</em></ins></span> of
+    <span class="removed"><del><strong>a &lt;a 
href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This demonstrates what we've said for years: using proprietary
-    software means letting someone have power over you, and you're going
+    software means letting someone have power over you,</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>you're going
     to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -510,15 +492,34 @@
     for its USB-to-serial chips has been designed to &lt;a
     
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
-    so that they no longer work.</em></ins></span> Microsoft <span 
class="inserted"><ins><em>is &lt;a
+    so that they no longer work. Microsoft is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
     this automatically&lt;/a&gt; as an &ldquo;upgrade&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511240"&gt;
-    &lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+    &lt;p&gt;Windows</em></ins></span> 10 &ldquo;upgrades&rdquo; &lt;a
     
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
-    delete applications&lt;/a&gt; without asking permission.&lt;/p&gt;
+    delete applications&lt;/a&gt; without asking <span 
class="removed"><del><strong>permission.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft is &lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+  repeatedly nagging many users to install Windows 10&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Microsoft was for months &lt;a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
+tricking users into &ldquo;upgrading&rdquo; to Windows 10&lt;/a&gt;, if they
+failed to notice and say no.
+&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;
+  Microsoft informs the NSA of bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;
+  Microsoft</strong></del></span> <span 
class="inserted"><ins><em>permission.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201503260"&gt;
@@ -541,7 +542,13 @@
 &lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
 
 &lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+for</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306220"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
+    informs</em></ins></span> the <span class="removed"><del><strong>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> of <span 
class="removed"><del><strong>Microsoft committing
 interference.&lt;/p&gt;
 
 &lt;ul&gt;
@@ -549,73 +556,80 @@
       &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
        intrusive ads for Microsoft products and its
        partners' products&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article's author starts from</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from the premise that Microsoft
+      has a right to control what</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span 
class="removed"><del><strong>does to users, as long as it
+      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts</strong></del></span> <span 
class="inserted"><ins><em>before fixing them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201306220"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
-    informs</em></ins></span> the <span class="removed"><del><strong>premise 
that Microsoft
-      has a right to control what Windows does to users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
-      annoying advertisements inside</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> of <span 
class="removed"><del><strong>the File Explorer&lt;/a&gt; to nag
-      users to buy subscriptions for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
+&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201507150"&gt;
+    &lt;p&gt;Microsoft Office forces users</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside of the File 
Explorer&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    subscribe</em></ins></span> to <span class="removed"><del><strong>nag
+      users</strong></del></span> <span class="inserted"><ins><em>Office 
365</em></ins></span> to <span class="removed"><del><strong>buy subscriptions 
for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;In order to increase</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span 
class="removed"><del><strong>10's install base, Microsoft
+&lt;li&gt;In order</strong></del></span> <span class="inserted"><ins><em>be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's install base, Microsoft
 &lt;a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice and privacy&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>before fixing 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+blatantly disregards user choice and privacy&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>create/edit 
documents&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
-started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
+started</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201507150"&gt;
-    &lt;p&gt;Microsoft Office forces</em></ins></span> users <span 
class="removed"><del><strong>obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
+    users <span class="removed"><del><strong>obnoxiously and 
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an 
account on their network&lt;/a&gt; to be able</em></ins></span> to install 
<span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+  &lt;li&gt;&lt;p&gt;Microsoft
+      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
         tricking
         users&lt;/a&gt; &lt;a
 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
 into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
-company's
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed 
by</strong></del></span>
+    <span class="inserted"><ins><em>and use</em></ins></span> the
+<span class="removed"><del><strong>company's
 sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
-users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>the sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to <span 
class="removed"><del><strong>Windows
-10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-&lt;/ul&gt;
-
-
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Microsoft 
Surveillance&lt;/h3&gt;
-
-&lt;ul&gt;
-
-&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+users</strong></del></span> <span class="inserted"><ins><em>Windows operating 
system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>a subscription product.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul class="blurbs"&gt;
   &lt;li id="M201908210"&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers listen</em></ins></span> to the <span 
class="removed"><del><strong>sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>say whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
@@ -973,7 +987,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/02 15:02:55 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- malware-microsoft.it.po     17 Oct 2020 08:05:07 -0000      1.155
+++ malware-microsoft.it.po     2 Nov 2020 15:02:59 -0000       1.156
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -925,6 +925,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-microsoft.ja-diff.html      17 Oct 2020 08:05:07 -0000      1.68
+++ malware-microsoft.ja-diff.html      2 Nov 2020 15:02:59 -0000       1.69
@@ -293,23 +293,29 @@
 
 &lt;p&gt;The wrongs in this</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Interference&lt;/h3&gt;
 
-&lt;p&gt;This</em></ins></span> section <span class="removed"><del><strong>are 
not precisely malware, since they do</strong></del></span> <span 
class="inserted"><ins><em>gives examples of Microsoft software harassing or 
annoying
-the user, or causing trouble for the user.  These actions are like
-sabotage but the word &ldquo;sabotage&rdquo; is too strong for them.&lt;/p&gt;
+&lt;p&gt;This</em></ins></span> section <span class="removed"><del><strong>are 
not precisely malware, since they do
+not involve making</strong></del></span> <span class="inserted"><ins><em>gives 
examples of Microsoft software harassing or annoying</em></ins></span>
+the <span class="removed"><del><strong>program that runs in a way that 
hurts</strong></del></span> <span class="inserted"><ins><em>user, or causing 
trouble for</em></ins></span> the user.
+<span class="removed"><del><strong>But they</strong></del></span>  <span 
class="inserted"><ins><em>These actions</em></ins></span> are <span 
class="removed"><del><strong>a lot</strong></del></span> like <span 
class="removed"><del><strong>malware, since they are technical Microsoft
+actions that harm to</strong></del></span>
+<span class="inserted"><ins><em>sabotage but</em></ins></span> the <span 
class="inserted"><ins><em>word &ldquo;sabotage&rdquo; is too strong for 
them.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809120"&gt;
     &lt;p&gt;One version of Windows 10 &lt;a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
-    harangues users if they try to install Firefox (or 
Chrome)&lt;/a&gt;.&lt;/p&gt;
+    harangues</em></ins></span> users <span class="inserted"><ins><em>if they 
try to install Firefox (or Chrome)&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803190"&gt;
     &lt;p&gt;Microsoft is planning to make Windows &lt;a
     
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
-    impose use of its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
+    impose use</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The reason Microsoft can force things on users is that Windows
+    &lt;p&gt;The reason</em></ins></span> Microsoft <span 
class="removed"><del><strong>software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Once</strong></del></span> <span 
class="inserted"><ins><em>can force things on users is that Windows
     is nonfree.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -319,8 +325,8 @@
     intrusive ads for Microsoft products and its partners'
     products&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article's author starts from the premise that Microsoft has
-    a right to control what Windows does to users, as long as it doesn't
+    &lt;p&gt;The article's author starts from the premise 
that</em></ins></span> Microsoft has <span 
class="removed"><del><strong>tricked</strong></del></span>
+    a <span class="removed"><del><strong>user into accepting 
installation</strong></del></span> <span class="inserted"><ins><em>right to 
control what Windows does to users, as long as it doesn't
     go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -332,19 +338,26 @@
   &lt;/li&gt;
 
   &lt;li id="M201608170"&gt;
-    &lt;p&gt; After &lt;a 
href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing the 
download of Windows 10&lt;/a&gt;
-    on computers that were running Windows 7 and 8, Microsoft &lt;a
-    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    repeatedly switched on a flag that urged users to
-    &ldquo;upgrade&rdquo; to Windows 10&lt;/a&gt; when they had turned
-    it off, in the hope that some day they would fail to say no.
+    &lt;p&gt; After &lt;a 
href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing the 
download</em></ins></span> of Windows
+   <span class="removed"><del><strong>10,</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt;
+    on computers that were running Windows 7 and 8, 
Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    repeatedly switched on a flag</em></ins></span> that <span 
class="inserted"><ins><em>urged users to
+    &ldquo;upgrade&rdquo; to Windows 10&lt;/a&gt; when</em></ins></span> they 
<span class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>had turned
+    it off, in</em></ins></span> the <span 
class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail</em></ins></span> 
to <span class="removed"><del><strong>cancel or even postpone the
+   imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
     To do this, Microsoft used &lt;a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
     malware techniques&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;A detailed &lt;a
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-    analysis of Microsoft's scheme&lt;/a&gt; is available on the Electronic
+    analysis</em></ins></span> of <span 
class="removed"><del><strong>installation&lt;/a&gt;.
+   &lt;/p&gt;
+   &lt;p&gt;This demonstrates what we've said for years: using proprietary
+   software means letting someone have power over you, and you're
+   going</strong></del></span> <span class="inserted"><ins><em>Microsoft's 
scheme&lt;/a&gt; is available on the Electronic
     Frontier Foundation's website.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -352,24 +365,29 @@
     &lt;p&gt;Microsoft has made companies'
     Windows machines managed by the company's sysadmins &lt;a
     
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
-    users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
+    users</em></ins></span> to <span class="removed"><del><strong>get screwed 
sooner or later.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> <span 
class="inserted"><ins><em>complain to the sysadmins about not 
&ldquo;upgrading&rdquo;
     to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601160"&gt;
-    &lt;p&gt;Microsoft has &lt;a
+    &lt;p&gt;Microsoft</em></ins></span> has &lt;a
     
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
     all future Intel CPUs for Windows 7 and 8&lt;/a&gt;. Those
     machines will be stuck with the nastier Windows 10.  &lt;a
     
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
-    AMD and Qualcomm CPUs, too&lt;/a&gt;.&lt;/p&gt;
+    AMD and Qualcomm CPUs, <span class="removed"><del><strong>too&lt;/a&gt;.
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;Of course, Windows 7 and 8 are unethical too, because they are
     proprietary software.  But this example of Microsoft's wielding its
-    power demonstrates the power it holds.&lt;/p&gt;
+    power demonstrates the power it <span class="removed"><del><strong>holds.
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>holds.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;Free software developers also stop maintaining old versions of
-    their programs, but this is not unfair to users because the users of
+    their programs, but this is not unfair to users because the
+  <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>users of
     free software have control over it.  If it is important enough to you,
     you and other users can hire someone to support the old version on
     your future platforms.&lt;/p&gt;
@@ -379,43 +397,31 @@
 
 &lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
 
-&lt;p&gt;The wrongs in this section are not precisely malware, since they 
do</em></ins></span>
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Microsoft
-actions that harm <span class="removed"><del><strong>to</strong></del></span> 
the users of specific Microsoft software.&lt;/p&gt;
+actions that harm the users of specific Microsoft software.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Once Microsoft</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> has <span 
class="removed"><del><strong>tricked</strong></del></span> <span 
class="inserted"><ins><em>been  &lt;a
+    &lt;p&gt;Microsoft has been  &lt;a
     
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing</em></ins></span> a <span 
class="removed"><del><strong>user into accepting 
installation</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;remediation&rdquo;
+    force-installing a &ldquo;remediation&rdquo;
     program&lt;/a&gt; on computers running certain
-    versions</em></ins></span> of Windows
-   <span class="removed"><del><strong>10,</strong></del></span> <span 
class="inserted"><ins><em>10. Remediation, in Microsoft's view, 
means</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-   find that they are denied the option</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, 
notably</em></ins></span> to <span class="removed"><del><strong>cancel or even 
postpone</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;repair&rdquo; any components 
of</em></ins></span> the
-   <span class="removed"><del><strong>imposed date</strong></del></span> <span 
class="inserted"><ins><em>updating system that users
+    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
+    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
+    tampering with users' settings and files&lt;/a&gt;, notably to
+    &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions</em></ins></span> of 
<span class="removed"><del><strong>installation&lt;/a&gt;.
-   &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>this 
program to
+    them. Microsoft repeatedly pushed faulty versions of this program to
     users' machines, causing numerous problems, some of which &lt;a
     
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>demonstrates what we've 
said for years: using</strong></del></span> <span 
class="inserted"><ins><em>exemplifies the arrogant and manipulative attitude
-    that</em></ins></span> proprietary software <span 
class="removed"><del><strong>means letting someone</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> have <span 
class="removed"><del><strong>power over you, and you're
-   going</strong></del></span> <span 
class="inserted"><ins><em>learned</em></ins></span> to <span 
class="removed"><del><strong>get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
+    critical&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft
-  has</strong></del></span> <span class="inserted"><ins><em>adopt
-    toward the people they are supposedly serving. Migrate to 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
-  all future Intel CPUs for</strong></del></span>
-    <span class="inserted"><ins><em>href="/distros/free-distros.html"&gt;free 
operating system&lt;/a&gt; if you
+    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
+    that proprietary software developers have learned to adopt
+    toward the people they are supposedly serving. Migrate to a &lt;a
+    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
     can!&lt;/p&gt;
 
     &lt;p&gt;If your employer makes you run Windows, tell the financial
@@ -424,20 +430,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201704194"&gt;
-    &lt;p&gt;Microsoft has made</em></ins></span> Windows 7
-    and <span class="removed"><del><strong>8&lt;/a&gt;. Those machines will
-  be stuck with the nastier</strong></del></span> <span 
class="inserted"><ins><em>8 cease to function on certain new computers, &lt;a
+    &lt;p&gt;Microsoft has made Windows 7
+    and 8 cease to function on certain new computers, &lt;a
     
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
-    forcing their owners to switch to</em></ins></span> Windows <span 
class="removed"><del><strong>10.</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt;.&lt;/p&gt;
+    forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704134"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
-  AMD</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped support for Windows 7</em></ins></span> and <span 
class="removed"><del><strong>Qualcomm CPUs, too&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;Of course,</strong></del></span> <span class="inserted"><ins><em>8 
on recent processors&lt;/a&gt;
+    &lt;p&gt;Microsoft &lt;a
+    
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
+    has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
     in a big hurry.&lt;/p&gt;
 
     &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
@@ -446,8 +448,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201606270"&gt;
-    &lt;p id="windows10-forcing"&gt;In its efforts to trick users 
of</em></ins></span> Windows
-    7 and 8 <span class="removed"><del><strong>are unethical too, 
because</strong></del></span> <span class="inserted"><ins><em>into installing 
all-spying Windows 10 against their
+    &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
     will, Microsoft forced their computers to &lt;a
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
     silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
@@ -466,14 +468,8 @@
     &lt;p&gt;Once Microsoft has tricked a user
     into accepting installation of Windows 10, &lt;a
     
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that</em></ins></span> they are
-  <span class="removed"><del><strong>proprietary software.  But this example 
of Microsoft's wielding its
-  power demonstrates</strong></del></span> <span 
class="inserted"><ins><em>denied</em></ins></span> the <span 
class="removed"><del><strong>power it holds.
-  &lt;/p&gt;
-  &lt;p&gt;Free software developers also stop maintaining old versions of
-  their programs, but this is not unfair</strong></del></span> <span 
class="inserted"><ins><em>option</em></ins></span> to <span 
class="removed"><del><strong>users because</strong></del></span> <span 
class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
-  <span class="removed"><del><strong>users</strong></del></span>
-    <span class="inserted"><ins><em>imposed date</em></ins></span> of <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
+    find that they are denied the option to cancel or even postpone the
+    imposed date</em></ins></span> of <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This demonstrates what we've said for years: using 
proprietary</em></ins></span>
     software <span class="inserted"><ins><em>means letting 
someone</em></ins></span> have <span 
class="removed"><del><strong>control</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> over <span 
class="removed"><del><strong>it.  If it is important
@@ -567,7 +563,7 @@
 
 &lt;ul&gt;
 
-&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>increase Windows 10's install base, 
Microsoft</strong></del></span> <span class="inserted"><ins><em>be able to 
create/edit documents&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -575,6 +571,15 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's</strong></del></span> install <span class="removed"><del><strong>base, 
Microsoft</strong></del></span>
+    <span class="inserted"><ins><em>and use the Windows operating system, 
which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908210"&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
@@ -958,7 +963,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/02 15:02:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-microsoft.ja.po     17 Oct 2020 08:05:07 -0000      1.135
+++ malware-microsoft.ja.po     2 Nov 2020 15:02:59 -0000       1.136
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -750,6 +750,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-microsoft.pot       17 Oct 2020 08:05:07 -0000      1.93
+++ malware-microsoft.pot       2 Nov 2020 15:02:59 -0000       1.94
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -535,6 +535,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a "
+"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
+"users to create an account on their network</a> to be able to install and "
+"use the Windows operating system, which is malware. The account can be used "
+"for surveillance and/or violating people's rights in many ways, such as "
+"turning their purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a "
 
"href=\"https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana\";>
 "
 "human workers listen to the recordings</a>."

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- malware-microsoft.ru.po     19 Oct 2020 10:00:05 -0000      1.233
+++ malware-microsoft.ru.po     2 Nov 2020 15:02:59 -0000       1.234
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -768,6 +769,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- nl.po       2 Nov 2020 11:01:44 -0000       1.224
+++ nl.po       2 Nov 2020 15:02:59 -0000       1.225
@@ -4858,6 +4858,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -8340,16 +8350,6 @@
 "&rdquo;)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -9145,6 +9145,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- pl.po       2 Nov 2020 11:01:44 -0000       1.223
+++ pl.po       2 Nov 2020 15:02:59 -0000       1.224
@@ -4336,6 +4336,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7841,16 +7851,6 @@
 "&rdquo;)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -8629,6 +8629,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- pot 2 Nov 2020 11:01:44 -0000       1.222
+++ pot 2 Nov 2020 15:02:59 -0000       1.223
@@ -4077,6 +4077,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7160,16 +7170,6 @@
 "&rdquo;)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #
 #
 #
@@ -7861,6 +7861,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-surveillance.de-diff.html       17 Oct 2020 08:05:09 -0000      
1.135
+++ proprietary-surveillance.de-diff.html       2 Nov 2020 15:02:59 -0000       
1.136
@@ -278,6 +278,15 @@
   &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -556,19 +565,28 @@
 
 &lt;div class="big-subsection"&gt;
   <span class="inserted"><ins><em>&lt;span 
id="SpywareAtLowLevel"&gt;&lt;/span&gt;</em></ins></span>
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInAndroid"&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>id="SpywareInBIOS"&gt;BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInAndroid"&gt;Spyware 
in Android&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInBIOS"&gt;BIOS&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;
+  &lt;p&gt;20 dishonest Android apps
+      recorded &lt;a 
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+      calls and sent them and text messages</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201509220"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-    Lenovo stealthily installed crapware and spyware via
+    Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
+      snoopers&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Google</strong></del></span> <span 
class="inserted"><ins><em>spyware via
     BIOS&lt;/a&gt; on Windows installs.  Note that the specific
-    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    sabotage method Lenovo used</em></ins></span> did not <span 
class="removed"><del><strong>intend to make these</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span 
class="removed"><del><strong>Android&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -576,14 +594,10 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;
-  &lt;p&gt;20 dishonest Android</strong></del></span>
-<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInTelephones"&gt;All &ldquo;Smart&rdquo; Phones&lt;/h4&gt;
@@ -592,45 +606,67 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006260"&gt;
-    &lt;p&gt;Most</em></ins></span> apps
-      <span class="removed"><del><strong>recorded</strong></del></span> <span 
class="inserted"><ins><em>are malware, but
-    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-      calls and sent</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on users as well
-    as snooping on</em></ins></span> them <span 
class="removed"><del><strong>and text messages and emails to
-      snoopers&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Google did</strong></del></span> <span 
class="inserted"><ins><em>itself&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most</em></ins></span> apps <span 
class="removed"><del><strong>spy;</strong></del></span> <span 
class="inserted"><ins><em>are malware, but
+    Trump's campaign app, like Modi's campaign app, is &lt;a
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop</em></ins></span> on 
<span class="removed"><del><strong>the contrary,</strong></del></span> <span 
class="inserted"><ins><em>users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
-    approach, but that does</em></ins></span> not <span 
class="removed"><del><strong>intend</strong></del></span> <span 
class="inserted"><ins><em>tell us whether it has functionalities we
-    consider malicious, such as sending data the user has not explicitly
+    approach, but that does not tell us whether</em></ins></span> it
+    <span class="removed"><del><strong>worked in various ways to prevent that, 
and deleted these apps
+    after discovering what they did. So</strong></del></span> <span 
class="inserted"><ins><em>has functionalities</em></ins></span> we <span 
class="removed"><del><strong>cannot blame Google
+    specifically for</strong></del></span>
+    <span class="inserted"><ins><em>consider malicious, such as sending 
data</em></ins></span> the <span 
class="removed"><del><strong>snooping</strong></del></span> <span 
class="inserted"><ins><em>user has not explicitly
     asked to send.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to make <span 
class="removed"><del><strong>these apps spy; on</strong></del></span> <span 
class="inserted"><ins><em>sure they can't &ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>contrary, it
-    worked in various ways</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>these apps.&lt;/p&gt;
+
+  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their
+    being nonfree. It also distributes its own nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
+    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
+    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span> to <span 
class="removed"><del><strong>see what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> they
+    <span class="removed"><del><strong>do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the
+    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>prevent that,</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>Edward 
Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>snooping of these apps.&lt;/p&gt;
-
-  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
-    text messages, read call, location</em></ins></span> and
-    <span class="removed"><del><strong>therefore shares 
in</strong></del></span> <span class="inserted"><ins><em>web browsing history, 
and
-    read</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is designed to disguise 
itself
+    them</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>phones on and off, 
listen</em></ins></span> to the
+    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span> <span 
class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security,</strong></del></span> <span 
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by</strong></del></span>
+    <span class="inserted"><ins><em>read</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is 
designed</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -638,25 +674,30 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>injustice of their
-    being nonfree.</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
-    phones have.</em></ins></span> It <span class="removed"><del><strong>also 
distributes its own nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
+    Android,</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;Could Google</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there</em></ins></span> 
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps from
+    the research paper</strong></del></span> <span 
class="inserted"><ins><em>not much
+    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of
+    <span class="removed"><del><strong>users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as 
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to</em></ins></span> have <span 
class="removed"><del><strong>done</strong></del></span> <span 
class="inserted"><ins><em>GPS.)&lt;/p&gt;
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>Appflood,
+      meant</strong></del></span> <span class="inserted"><ins><em>users cannot 
stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
+    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -670,521 +711,601 @@
   &lt;li id="M202009183"&gt;
     &lt;p&gt;Facebook &lt;a
     
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
+    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the 
<span class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full 
access</strong></del></span> <span class="inserted"><ins><em>device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202004200"&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made</em></ins></span> a <span class="removed"><del><strong>better 
job</strong></del></span> <span 
class="inserted"><ins><em>practice</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
-    cheating?  There is no</strong></del></span> <span 
class="inserted"><ins><em>surreptitiously activating the Siri software to &lt;a
+    made a practice of surreptitiously activating the Siri 
software</em></ins></span> to <span class="inserted"><ins><em>&lt;a
     
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
-    record users' conversations when they had not activated Siri&lt;/a&gt;.
-    This was not just occasional, it was</em></ins></span> systematic <span 
class="removed"><del><strong>way for Google, or Android
-    users,</strong></del></span> <span 
class="inserted"><ins><em>practice.&lt;/p&gt;
-
-    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>inspect executable proprietary 
apps</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> to <span 
class="removed"><del><strong>see what they
-    do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand the source code for</strong></del></span> these 
<span class="removed"><del><strong>apps, and study the
-    source code somehow to determine whether they mistreat 
users</strong></del></span> <span 
class="inserted"><ins><em>recordings,</em></ins></span> in
-    <span class="removed"><del><strong>various ways. If it 
did</strong></del></span> a <span class="removed"><del><strong>good 
job</strong></del></span> <span class="inserted"><ins><em>group that made
-    transcripts</em></ins></span> of <span class="removed"><del><strong>this, 
it could more or less</strong></del></span> <span 
class="inserted"><ins><em>them. He does not believes that Apple has ceased this
+    record</em></ins></span> users' <span class="removed"><del><strong>text 
messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>conversations 
when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> to <span 
class="removed"><del><strong>LinkedIn. Also, it stores detailed logs
+      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
     practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way to</em></ins></span> prevent <span 
class="removed"><del><strong>such snooping, except when</strong></del></span> 
<span class="inserted"><ins><em>this is, for</em></ins></span> the <span 
class="removed"><del><strong>app developers are clever
-    enough</strong></del></span> <span class="inserted"><ins><em>program that
-    controls access</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+    &lt;p&gt;The only reliable way</em></ins></span> to <span 
class="inserted"><ins><em>prevent this is, for</em></ins></span> the <span 
class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
 
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</strong></del></span> <span 
class="inserted"><ins><em>microphone</em></ins></span> to <span 
class="removed"><del><strong>protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>decide when the user 
has
-    &ldquo;activated&rdquo; any service,</em></ins></span> to <span 
class="inserted"><ins><em>be free software, and</em></ins></span> the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span>
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>program that
+    controls access</em></ins></span> to the
+      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>microphone to decide 
when</em></ins></span> the <span class="removed"><del><strong>JS injection 
is</strong></del></span> <span class="inserted"><ins><em>user has
+    &ldquo;activated&rdquo; any service,</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span class="inserted"><ins><em>be free 
software, and</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed</strong></del></span>
     <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
-    sure Apple can't listen to them.&lt;/p&gt;</em></ins></span>
+    sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China to</em></ins></span> the 
<span class="removed"><del><strong>privacy and security
-    of 283 Android VPN apps concluded</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;in spite of</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
+  &lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="inserted"><ins><em>possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the
-    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
-    contains</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN 
apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>websites</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely subject
-    to poor security guarantees</strong></del></span> <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    with</em></ins></span> the <span class="removed"><del><strong>non-premium 
version</strong></del></span> <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="removed"><del><strong>app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>requests
     originating from single IP addresses, the government can identify
-    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>abusive practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following is a non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>Hong Kong, thus endangering their lives.&lt;/p&gt;
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  &lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>proprietary VPN</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
-    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>from
-    the research paper</strong></del></span> <span 
class="inserted"><ins><em>contain trackers</em></ins></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>are busy at night &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
+  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, 
Yelp</em></ins></span>
-    and <span class="removed"><del><strong>infringes the 
privacy</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it 
is likely that most nonfree apps contain
-    trackers. Some</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries</strong></del></span> <span 
class="inserted"><ins><em>these send personally identifying 
data</em></ins></span> such as <span class="removed"><del><strong>NativeX and 
Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
-
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>phone
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
+    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
-    is collected by the company, there is no telling what</em></ins></span> it 
<span class="removed"><del><strong>has full access to
-      users' text messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN</strong></del></span> <span 
class="inserted"><ins><em>will be
-    used for.&lt;/p&gt;
+    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
 
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned 
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>JS injection is</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>without having your fingerprints taken. Users would 
have
-    no way to tell whether</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
-    them from there.&lt;/p&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>have
-      confirmed</strong></del></span> <span class="inserted"><ins><em>on 
iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number</em></ins></span> that the <span 
class="removed"><del><strong>non-premium version of</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>app does
-      JavaScript injection</strong></del></span>
-    <span class="inserted"><ins><em>server records these 
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and 
display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>at least 
30 days.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of</strong></del></span>
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of</strong></del></span> <span class="inserted"><ins><em>photos
-    and videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up 
to date on all your devices. Any edits you
-    make</em></ins></span> are <span class="removed"><del><strong>not in 
fact</strong></del></span> <span class="inserted"><ins><em>automatically 
updated everywhere. [&hellip;] &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>Conditions&rdquo; that spell out
+what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>honestly 
identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>video you
+    take,</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
+place!&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track 
users</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span>
 by
-       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>keeps them up</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is
+    <span class="removed"><del><strong>yet another 
example</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup</em></ins></span> of <span class="removed"><del><strong>nonfree 
software pretending</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span>
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when</strong></del></span>
     <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
+    iCloud&lt;/a&gt;, but</em></ins></span> it's <span 
class="removed"><del><strong>actually doing something else.  
Such</strong></del></span> <span class="inserted"><ins><em>active by default so 
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing 
would be almost
+    unthinkable with free software.&lt;/p&gt;
 
-&lt;/li&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>default 
so it still counts as a
-    surveillance functionality.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
+    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>Android apps can collude to transmit users' 
personal
-       data</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span>
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>the most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-    security to get at them, but NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    nude photos</em></ins></span> of <span class="removed"><del><strong>their 
users with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>break Apple's
+    security to get at them, but NSA can access any of them 
through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Merely asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users 
is</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;The article should not</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
+    &lt;p&gt;This may</em></ins></span> have <span 
class="removed"><del><strong>described these apps as
+  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>enough</strong></del></span> <span 
class="inserted"><ins><em>as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not <span class="removed"><del><strong>free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
+    for <span class="removed"><del><strong>granted that the usual analytics 
tools are
+  legitimate, but is that valid?  Software developers 
have</strong></del></span> no <span class="removed"><del><strong>right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>possible purpose</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not</strong></del></span> <span 
class="inserted"><ins><em>than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect to 100</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span class="removed"><del><strong>honestly 
identify</strong></del></span>
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span>
     <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all the data in an iThing, or it
+    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;
+    turned off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also</em></ins></span> a <span 
class="inserted"><ins><em>feature for web sites to track users, which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
+    to <span class="removed"><del><strong>any file on</strong></del></span> 
<span class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving a valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
     to it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
     &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    many actions</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking 
at a folder,
+    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>be spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span class="inserted"><ins><em>a song.  They 
send device identifying
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>a song.  They send device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
+    other streaming dis-services make a dossier about each user, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make
+    users identify themselves</em></ins></span> to <span 
class="removed"><del><strong>use it without having your fingerprints
+      taken. Users would have</strong></del></span> <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
 
     &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
+    but we condemn this</em></ins></span> no <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
+    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
+    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>location 
data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</em></ins></span>
+    even <span class="removed"><del><strong>gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>when &ldquo;location services&rdquo; are turned 
off, even when</em></ins></span>
+    the <span class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold</em></ins></span> with <span class="removed"><del><strong>third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> the <span class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the 
tracking.</em></ins></span>  This is
-    yet another example of nonfree software pretending to obey the user,
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video</strong></del></span> 
<span class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if</em></ins></span> you <span 
class="removed"><del><strong>take,</strong></del></span> <span 
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>keeps them up to date on all your devices.
+      Any edits</strong></del></span> <span class="inserted"><ins><em>location 
tracking,</em></ins></span> you <span class="removed"><del><strong>make are 
automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>must
+    disable Google Play itself to completely stop</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
+    <span class="inserted"><ins><em>yet another example</em></ins></span> of 
<span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to 
break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>nonfree 
software pretending</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>obey</em></ins></span> the <span 
class="inserted"><ins><em>user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
+    transmission</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature</strong></del></span> <span 
class="inserted"><ins><em>substantial expense</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span> <span class="inserted"><ins><em>users.  
Said transmission,
+    not wanted or requested</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
+      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the user, clearly must constitute spying
     of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us</em></ins></span> by <span 
class="removed"><del><strong>default, though</strong></del></span> <span 
class="inserted"><ins><em>a paywall) reports</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI</em></ins></span> can <span class="removed"><del><strong>be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
-    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>remotely activate the GPS</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>microphone in Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
-    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably Windows laptops).  Here 
is &lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
-    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
-    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
+
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present in</em></ins></span> some <span 
class="inserted"><ins><em>Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      <span class="removed"><del><strong>send</strong></del></span>
-    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+  &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    listens</em></ins></span> for <span class="inserted"><ins><em>voice 
all</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>personal details of 
users that install</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>totally 
incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>not enough to
     legitimize actions like this.  At this point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, 
instead</em></ins></span> of <span class="removed"><del><strong>iOS 
seem</strong></del></span>
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    and</em></ins></span> other <span class="removed"><del><strong>than 
surveillance&lt;/a&gt;.  Here is</strong></del></span> <span 
class="inserted"><ins><em>companies from getting this personal information 
in</em></ins></span> the
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
+      sometimes very clever. Some trackers</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
-    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send</em></ins></span> lots of data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even</em></ins></span> which <span 
class="removed"><del><strong>enable them to turn</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to &lt;a
+    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
+    for Firefox and Chrome were found</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span class="removed"><del><strong>EU 
Copyright Directive make</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>problematic 
extensions</em></ins></span> from <span class="inserted"><ins><em>their stores, 
but this shows
     once more how unsafe nonfree software can be. Tools that are supposed
-    to protect a proprietary system are, instead, infecting</em></ins></span> 
it <span class="inserted"><ins><em>with
-    additional malware (the system itself being the original 
malware).&lt;/p&gt;
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because</strong></del></span> <span class="inserted"><ins><em>identify who is 
running it&lt;/a&gt;. The result is
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that</em></ins></span> this
-      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for 
repression of forbidden sharing
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
     &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1194,62 +1315,45 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
-      obvious way</strong></del></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    estimates whether the user has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
     tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app</em></ins></span> does <span 
class="removed"><del><strong>turn them off&mdash;only until 5am.
-      That's Apple</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Amazon Ring app does &lt;a
     
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you 
want</strong></del></span> <span class="inserted"><ins><em>other companies as 
well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to be <span 
class="removed"><del><strong>spied on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
+    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
     spying tool for the government of the United Arab Emirates&lt;/a&gt;.
     Any nonfree program could be doing this, and that is a good
-    reason</em></ins></span> to use <span class="removed"><del><strong>it 
without having your fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>free software instead.&lt;/p&gt;
+    reason to use free software instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>phone is</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
     the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
     &lt;p&gt;iMonsters and Android phones,
     when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;</em></ins></span>
-    snooping <span class="inserted"><ins><em>and sabotage 
capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>the device.  Many employers demand</em></ins></span> 
to <span class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother 
can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
     employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to 
contain</em></ins></span> a <span class="removed"><del><strong>server every 
phone number</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
@@ -1257,213 +1361,122 @@
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
-    saying</em></ins></span> that the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android version
+    saying that the tests were only performed on the Android version
     of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users</em></ins></span> even <span 
class="removed"><del><strong>gratis apps)&lt;/a&gt;
-      without</strong></del></span> <span class="inserted"><ins><em>when it is 
turned off&lt;/a&gt;, after tricking them
-    into</em></ins></span> giving <span class="removed"><del><strong>a valid 
email address and receiving</strong></del></span> the <span 
class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>app broad 
permissions in order</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>use one</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS</strong></del></span> <span 
class="inserted"><ins><em>its
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking</em></ins></span> apps <span 
class="inserted"><ins><em>including MIA Fem and Maya</em></ins></span> &lt;a 
<span class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>users' lives</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup</strong></del></span> <span class="inserted"><ins><em>a 
form</em></ins></span> of <span class="removed"><del><strong>iOS&lt;/a&gt;. The 
term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>surveillance.  There</em></ins></span> is a <span 
class="removed"><del><strong>way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span>
-    <span class="inserted"><ins><em>proprietary program for 
adjusting</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown</strong></del></span> <span 
class="inserted"><ins><em>certain telescopic rifle sight. &lt;a
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of all the 10,000 or 
more</em></ins></span> people <span class="removed"><del><strong>apparently 
took advantage</strong></del></span>
-    <span class="inserted"><ins><em>who have installed it&lt;/a&gt;.&lt;/p&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list</em></ins></span> 
of <span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>who has installed
+    &lt;p&gt;With a free program there would not be a list of who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
-    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed to break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>the 
operating system, in order</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>gather as much private data as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What 
we</em></ins></span> can <span class="removed"><del><strong>access any of them 
through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>software we 
run.&lt;/p&gt;
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user says &lt;a
+    users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>secretly</em></ins></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which 
is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>natalist Christians.  It spreads distrust
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+  &lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
     requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
     the event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware</em></ins></span> that can <span 
class="removed"><del><strong>be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+  &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-    data <span class="removed"><del><strong>in an iThing,
-      or it</strong></del></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized and aggregated,&rdquo; it can 
easily be
-    traced back</em></ins></span> to <span 
class="removed"><del><strong>exist</strong></del></span> <span 
class="inserted"><ins><em>the woman who uses the app.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>women's rights to 
equal employment
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less</em></ins></span> the
-      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>same thing without
-    spying on you</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new one is being 
developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google</em></ins></span> tracks <span 
class="removed"><del><strong>location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span> the <span class="removed"><del><strong>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable</strong></del></span> <span 
class="inserted"><ins><em>movements of Android</em></ins></span> phones <span 
class="inserted"><ins><em>and iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible 
for</em></ins></span> sending <span 
class="removed"><del><strong>lots</strong></del></span>
-    <span class="inserted"><ins><em>the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive</em></ins></span> 
data <span class="inserted"><ins><em>without
+    preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have 
access</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span>
-    <span class="inserted"><ins><em>the network but no direct access to the 
data. This results in massive
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
     surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, 
which</em></ins></span> can <span class="removed"><del><strong>take over 
smartphones&lt;/a&gt;
-      by sending hidden text messages</strong></del></span> <span 
class="inserted"><ins><em>use it
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
@@ -1474,10 +1487,10 @@
 
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps,</em></ins></span> which <span 
class="removed"><del><strong>enable them</strong></del></span> <span 
class="inserted"><ins><em>also &lt;a
+    library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>personal
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
     &lt;p&gt;It shows that no one can trust a nonfree program, not even the
@@ -1485,21 +1498,19 @@
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information</em></ins></span> on 
<span class="inserted"><ins><em>&lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>off, listen 
to</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the
-      <span class="removed"><del><strong>GPS,</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to</em></ins></span> take <span 
class="removed"><del><strong>photographs, read text messages, read call, 
location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>action. This proves
+    and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
@@ -3815,7 +3826,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/02 15:02:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.349
retrieving revision 1.350
diff -u -b -r1.349 -r1.350
--- proprietary-surveillance.de.po      17 Oct 2020 08:05:09 -0000      1.349
+++ proprietary-surveillance.de.po      2 Nov 2020 15:03:00 -0000       1.350
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -534,6 +534,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a href=\"http://www.bbc.com/news/";
 "technology-42309371\">includes a proprietary keyboard driver with a key "
 "logger in it</a>."

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-surveillance.es.po      18 Oct 2020 09:59:20 -0000      1.91
+++ proprietary-surveillance.es.po      2 Nov 2020 15:03:00 -0000       1.92
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-10-18 11:38+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -388,6 +389,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a href=\"http://www.bbc.com/news/";
 "technology-42309371\">includes a proprietary keyboard driver with a key "
 "logger in it</a>."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.551
retrieving revision 1.552
diff -u -b -r1.551 -r1.552
--- proprietary-surveillance.fr.po      17 Oct 2020 08:29:20 -0000      1.551
+++ proprietary-surveillance.fr.po      2 Nov 2020 15:03:00 -0000       1.552
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -381,6 +382,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a href=\"http://www.bbc.com/news/";
 "technology-42309371\">includes a proprietary keyboard driver with a key "
 "logger in it</a>."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary-surveillance.it-diff.html       17 Oct 2020 08:05:10 -0000      
1.201
+++ proprietary-surveillance.it-diff.html       2 Nov 2020 15:03:00 -0000       
1.202
@@ -276,6 +276,15 @@
   files</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -292,11 +301,11 @@
     
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
     by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The &lt;a
-    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
-    engineers to access, among other things, registry keys</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    engineers to access, among other things, registry keys &lt;a
+    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
     which can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -402,20 +411,25 @@
 
   &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
 
-    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="inserted"><ins><em>look at users' files for the US government
+    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>uses Windows 10's &ldquo;privacy policy&rdquo; to 
overtly impose a
+  &ldquo;right&rdquo; to</strong></del></span> look at users' files <span 
class="removed"><del><strong>at any time. Windows 10 full disk
+  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Thus, Windows is</strong></del></span> <span 
class="inserted"><ins><em>for the US government
     on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
     say so. Will it look at users' files for the Chinese government
     on demand?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506170"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> uses Windows 10's &ldquo;privacy 
policy&rdquo;
+    &lt;p&gt;Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
     to overtly impose a &ldquo;right&rdquo; to look at
-    users' files at any time. Windows 10 full disk encryption &lt;a <span 
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</em></ins></span>
+    users' files at any time. Windows 10 full disk encryption &lt;a
+    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
     gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Thus, Windows is overt malware in regard to surveillance, as in
+    &lt;p&gt;Thus, Windows is</em></ins></span> overt malware in regard to 
surveillance, as in
     other issues.&lt;/p&gt;
 
     &lt;p&gt;We can suppose Microsoft look at users' files for the US 
government
@@ -566,13 +580,12 @@
 
   &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
   but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean 
since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
   It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
     own malware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -599,49 +612,48 @@
     Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
     especially nasty malware, helping companies snoop</em></ins></span> on 
<span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps,</strong></del></span> users <span 
class="removed"><del><strong>could &lt;em&gt;make sure&lt;/em&gt; that they 
don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>as well
+  &lt;p&gt;With free software apps,</strong></del></span> users <span 
class="removed"><del><strong>could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps</strong></del></span> <span 
class="inserted"><ins><em>Biden's app has a less manipulative overall
-    approach, but</em></ins></span> that <span 
class="removed"><del><strong>track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>does not tell us whether it has 
functionalities we
+    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
+    approach, but</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>does not tell us whether it has functionalities we
     consider malicious, such as sending data the user has not explicitly
-    asked</em></ins></span> to <span class="removed"><del><strong>ultrasound 
from beacons placed in stores or played by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;</em></ins></span>
+    asked to send.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
-       data to servers.</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make 
sure they can't &ldquo;fool&rdquo;
     the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+  &lt;p&gt;Pairs of Android apps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude</strong></del></span> <span 
class="inserted"><ins><em>take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>phones on and 
off, listen to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+    them</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>turn the 
phones on and off, listen</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read the contact list. This malware</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -711,94 +723,83 @@
 
   &lt;p&gt;The article should</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
-    record users' conversations when they had</em></ins></span> not <span 
class="removed"><del><strong>have described</strong></del></span> <span 
class="inserted"><ins><em>activated Siri&lt;/a&gt;.
-    This was not just occasional, it was systematic practice.&lt;/p&gt;
-
-    &lt;p&gt;His job was to listen to</em></ins></span> these <span 
class="removed"><del><strong>apps as
-  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>recordings, in a group that made
-    transcripts of them. He does</em></ins></span> not <span 
class="removed"><del><strong>free software.  The clear</strong></del></span> 
<span class="inserted"><ins><em>believes that Apple has ceased this
-    practice.&lt;/p&gt;
+    record users' conversations when they had</em></ins></span> not <span 
class="removed"><del><strong>have described these apps as
+  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>activated Siri&lt;/a&gt;.
+    This was</em></ins></span> not <span class="removed"><del><strong>free 
software.  The clear way</strong></del></span> <span 
class="inserted"><ins><em>just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The only reliable</em></ins></span> way to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>prevent this is,</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools are
+    &lt;p&gt;The <span class="removed"><del><strong>article 
takes</strong></del></span> <span class="inserted"><ins><em>only reliable way 
to prevent this is,</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools are
   legitimate, but is</strong></del></span> <span 
class="inserted"><ins><em>program</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no 
right</strong></del></span>
     <span class="inserted"><ins><em>controls access</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as</strong></del></span> <span class="inserted"><ins><em>the 
microphone to decide when the user has
-    &ldquo;activated&rdquo;</em></ins></span> any <span 
class="removed"><del><strong>other snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span 
class="inserted"><ins><em>service,</em></ins></span> to <span 
class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>be free software,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola phones modify Android</strong></del></span>
-    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
-    sure Apple can't listen</em></ins></span> to <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+  <span class="removed"><del><strong>analyze what</strong></del></span> <span 
class="inserted"><ins><em>the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way,</em></ins></span> users 
<span class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>could make
+    sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing</em></ins></span> data <span class="inserted"><ins><em>from 
Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
     with the Chinese government, its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
     dissenters in China and Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis 
Android</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package</strong></del></span>
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>(but not</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data</em></ins></span> 
such as <span class="removed"><del><strong>Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But it</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are 
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most 
nonfree apps contain
+    trackers.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>of these</em></ins></span> send <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>personally identifying</em></ins></span> data <span 
class="removed"><del><strong>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package</strong></del></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>any 
file</strong></del></span> <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy</em></ins></span> on <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS:</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive</em></ins></span> make 
<span class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -810,7 +811,17 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709210"&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
@@ -852,10 +863,10 @@
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload</em></ins></span> to Apple's servers 
all the photos
+    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -973,90 +984,92 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn 
the</strong></del></span>
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi</em></ins></span> phones
-      <span class="removed"><del><strong>on and off, listen 
to</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
-    visiting a website, listening to a song.  They send device identifying
+    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to 
turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking at a 
folder,
+    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>the microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>a song.  They 
send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
+    &lt;p&gt;Other nonfree programs snoop too. For instance, 
Spotify</em></ins></span> and <span class="removed"><del><strong>web
+      browsing history,</strong></del></span>
+    <span class="inserted"><ins><em>other streaming dis-services make a 
dossier about each user,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
     users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
+    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>same wrongs when 
the culprits are not Chinese,
     but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201811230"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    in airplane mode. It didn't</em></ins></span> send <span 
class="removed"><del><strong>so much</strong></del></span> <span 
class="inserted"><ins><em>the location</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
+      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
+    &lt;p&gt;Android tracks location</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>user, clearly must constitute 
spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone <span 
class="inserted"><ins><em>has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some
-      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>system.&lt;/p&gt;</em></ins></span>
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
@@ -1099,70 +1112,97 @@
 
   &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+      it tries to get</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>users is not enough</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span>
     <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    reading</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms and Conditions&rdquo;</em></ins></span> 
that <span class="inserted"><ins><em>spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, 
instead</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span>
+    honestly identify the information</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install</strong></del></span> <span 
class="inserted"><ins><em>collects</em></ins></span> on <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>users, instead</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
+   information about the users' searches that</strong></del></span>
     <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we must 
prevent</em></ins></span> Google <span class="removed"><del><strong>normally 
gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    and <span class="inserted"><ins><em>other companies from getting this 
personal information in</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, 
judging</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used</em></ins></span> by <span 
class="inserted"><ins><em>most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of</em></ins></span> data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots</em></ins></span> of data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets 
when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</em></ins></span>
 they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span>
-    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the <span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+        &lt;p&gt;This example illustrates</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1182,45 +1222,32 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
     &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>users' 
detailed browsing habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="inserted"><ins><em>Google
-    removed</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
-    once more how unsafe nonfree software can be. Tools that are supposed
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more</em></ins></span> how <span 
class="removed"><del><strong>&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are 
supposed
     to protect a proprietary system are, instead, infecting it with
-    additional malware (the system itself being</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;</em></ins></span>
+    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
-    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot of money.&lt;/p&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    &lt;p&gt;The fact that this is used</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>repression of forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is</em></ins></span> not <span class="removed"><del><strong>only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure 
for the injustice</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It 
may avoid
-    paying for</em></ins></span> the <span class="removed"><del><strong>phone, 
and in server accounts,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it 
<span class="removed"><del><strong>can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1229,214 +1256,149 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code</em></ins></span> app <span 
class="removed"><del><strong>tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span>
-    <span class="inserted"><ins><em>estimates whether</em></ins></span> the 
<span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19 and &lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
-        for</strong></del></span> <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Alipay Health Code</em></ins></span> app
+    <span class="inserted"><ins><em>estimates whether the user has Covid-19 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does &lt;a
-    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;</em></ins></span>
-    surveillance <span class="removed"><del><strong>is 
inadequate</strong></del></span> <span class="inserted"><ins><em>for other 
companies</em></ins></span> as <span class="removed"><del><strong>a protection 
against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;</em></ins></span>
+    surveillance <span class="removed"><del><strong>software snoop on what 
radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>for other 
companies</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+ and Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new 
voice</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc</em></ins></span> messaging app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance</strong></del></span>
+    &lt;p&gt;The ToToc messaging</em></ins></span> app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that is a good
-    reason to use free</em></ins></span> software <span 
class="removed"><del><strong>snoop on what radio</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+    spying tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>the 
government of the United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>that is a good
+    reason</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>use free software instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>picture you take according to who
+      is</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;free&rdquo;</em></ins></span> in
+    the <span class="removed"><del><strong>frame.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>sense</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>Android phones,
+    &lt;p&gt;iMonsters and Android phones,
     when used for work, give employers powerful &lt;a
     
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on <span class="removed"><del><strong>various 
sites 
-      such</strong></del></span> <span class="inserted"><ins><em>the device.  
Many employers demand to do this.  For the
-    employee, this is simply nonfree software,</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>fundamentally unjust</em></ins></span>
-    and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;</em></ins></span>
+    snooping and sabotage capabilities&lt;/a&gt;</em></ins></span> if <span 
class="inserted"><ins><em>they install their own
+    software on</em></ins></span> the <span class="removed"><del><strong>user 
didn't &ldquo;upload&rdquo; them</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand</em></ins></span> to 
<span class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span>
+    <span class="inserted"><ins><em>employee, this</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>simply nonfree 
software, as fundamentally unjust</em></ins></span>
+    and <span class="removed"><del><strong>snooping). In August
+      2015</strong></del></span> <span class="inserted"><ins><em>as dangerous 
as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile</strong></del></span>
+    the Great Nation&rdquo; app requires users to grant</em></ins></span> it 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the</em></ins></span> phone's <span 
class="removed"><del><strong>photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> the 
<span class="removed"><del><strong>picture you take 
according</strong></del></span> <span class="inserted"><ins><em>Android version 
was found</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>contain a
-    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>frame.&lt;/p&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>the 
phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting to realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access 
to</strong></del></span> <span class="inserted"><ins><em>users'
+      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to 
contain</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing 
developers</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether</strong></del></span> <span class="inserted"><ins><em>run any 
code</em></ins></span> they <span class="removed"><del><strong>want that. This 
is a typical example of</strong></del></span> <span 
class="inserted"><ins><em>wish in</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at</em></ins></span> some
-      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span 
class="inserted"><ins><em>workplaces.&lt;/p&gt;
+    app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that</em></ins></span> the <span class="removed"><del><strong>wire 
to Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android version
-    of the app,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this 
kind</em></ins></span> of
-    <span class="inserted"><ins><em>&lsquo;superuser&rsquo; surveillance could 
not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The</em></ins></span> Facebook <span 
class="removed"><del><strong>users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>app &lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users</em></ins></span> even <span class="removed"><del><strong>if 
the user didn't &ldquo;upload&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>when it is turned off&lt;/a&gt;, after 
tricking</em></ins></span> them <span 
class="removed"><del><strong>to</strong></del></span>
-    <span class="inserted"><ins><em>into giving</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>snooping). In 
August
-      2015 it</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>proprietary
-    program</em></ins></span> is a <span class="removed"><del><strong>typical 
example</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="inserted"><ins><em>surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>list</em></ins></span> of <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they</strong></del></span> <span class="inserted"><ins><em>10,000 
or more people
-    who</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
+    Washington Post version</em></ins></span> of the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user</strong></del></span> <span 
class="inserted"><ins><em>installed it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With a free program there would not be a list of 
who</em></ins></span> has
-    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>installed
-    it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing 
features
-    of the operating system, in order to gather</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>much private data</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span>
-    <span class="inserted"><ins><em>they possibly can.&lt;/p&gt;
-
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>at least 
is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
       &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android</em></ins></span> apps <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>can track
-    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>the
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed</em></ins></span> on the 
<span class="removed"><del><strong>user&lt;/a&gt;. This is in addition to
+      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>Android version
+    of</em></ins></span> the <span class="removed"><del><strong>phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
       phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted</strong></del></span> <span 
class="inserted"><ins><em>Android,
-    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>malicious apps.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
+      users</strong></del></span> <span class="inserted"><ins><em>that, 
according</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>natalist Christians. 
 It spreads distrust
-    for contraception.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
+      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>run a proprietary 
phone app&lt;/a&gt;</em></ins></span> to <span class="inserted"><ins><em>be 
allowed into</em></ins></span>
-    the <span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+  &lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
+    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it 
<span class="inserted"><ins><em>can easily be
-    traced back</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
-      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should</strong></del></span> <span class="inserted"><ins><em>equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
-    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
+    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
+    it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1445,41 +1407,49 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>that does more 
or less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
       users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of the operating system, in order to gather as much 
private</em></ins></span> data <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
       spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool</em></ins></span> for <span class="removed"><del><strong>companies, 
and the NSA takes advantage to spy through it too&lt;/a&gt;.
+      Here's information</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    for contraception.&lt;/p&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information</strong></del></span> on
+    &lt;p&gt;It snoops</em></ins></span> on
       <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1489,142 +1459,204 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>toys with a mobile 
phone.</strong></del></span> <span 
class="inserted"><ins><em>data.</em></ins></span> This <span 
class="removed"><del><strong>would
-      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>results</em></ins></span> in <span 
class="inserted"><ins><em>massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>a 
child's speech, and even speak
-      into</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>toys with</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
+      into</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
        was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute 
by
+      minute (thus, indirectly, whether</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>was 
surrounded by a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
+      standard with which manufacturers would</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>statements about</strong></del></span> their <span 
class="removed"><del><strong>products, rather than free software which users 
could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
-    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span> data <span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
-    medical condition.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>had sold the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to</em></ins></span> be
+      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
+    the <span class="inserted"><ins><em>location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
-    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected</em></ins></span> would <span 
class="removed"><del><strong>have been able to figure out
-      who the user was.&lt;/p&gt;
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="inserted"><ins><em>huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive</em></ins></span> 
data <span class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>data broker 
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on 
to user-installed apps that</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who</strong></del></span>
+    the <span class="removed"><del><strong>user was.&lt;/p&gt;
     
     &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>network but no direct access 
to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which the user</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even the
-    developers</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    medical condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps 
that</em></ins></span>
+    way <span class="removed"><del><strong>to access the data&lt;/a&gt;
       collected by the manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;That the manufacturer</strong></del></span> and <span 
class="inserted"><ins><em>released them, apparently not realizing that 
all</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are 
ineffective</em></ins></span> at <span class="removed"><del><strong>Low 
Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>preventing nonfree software developers 
from including malware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
 Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
     them to phishing sites</em></ins></span> that <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
     the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
+    there</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span> 
really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1638,18 +1670,15 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect the emails</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span class="inserted"><ins><em>them 
was designed to make uninstallation
-    difficult.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because</strong></del></span> <span class="inserted"><ins><em>10 
gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps 
if</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>haven't yet, but they should also stay 
away from nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>are &lt;em&gt;not&lt;/em&gt;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1660,35 +1689,26 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
-    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
-    found as well.&lt;/p&gt;
-
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;.</em></ins></span> The 
<span class="removed"><del><strong>Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1700,21 +1720,14 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>company</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
         watching&lt;/a&gt;, even when</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
+    <span class="inserted"><ins><em>being sued, demanding that it 
notify</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>will do
+    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+    &lt;p&gt;We think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1725,21 +1738,31 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue. 
What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
+  &lt;/li&gt;
+
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>will do
-    with</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. 
What</em></ins></span> the <span class="removed"><del><strong>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>report even which page</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>company 
does
-    with</em></ins></span> the <span class="removed"><del><strong>e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
@@ -1748,99 +1771,104 @@
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>is a secondary 
issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>the app; others only 
say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a
-    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and 
WeatherBug,</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
   snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>tracking people's 
locations.&lt;/p&gt;</em></ins></span> 
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>system 
has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>obtains</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> the <span class="removed"><del><strong>cell 
phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>same 
machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>phone company to 
track</strong></del></span> <span class="inserted"><ins><em>user's activities 
in</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>app; others only say 
that</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span> 
is <span class="removed"><del><strong>possible to physically 
remove</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;The case</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>invasion 
isn't done by malware. The other
-      cases mentioned</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables the phone company to track</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>other ways</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>turn 
off</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>other kinds of</em></ins></span> location <span 
class="removed"><del><strong>at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information,</strong></del></span>
-    <span class="inserted"><ins><em>tracking,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>most users will be tricked by</em></ins></span> the 
<span class="removed"><del><strong>state orders it to get</strong></del></span> 
<span class="inserted"><ins><em>misleading control.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
+    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+    source code they cannot look at.</em></ins></span>  The other
+      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps 
might be snooping</em></ins></span>
+    in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company says it 
doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
@@ -1850,167 +1878,157 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
-  &lt;/li&gt;
+  send</strong></del></span>
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found to snoop
-    and collect information</em></ins></span> about <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of</em></ins></span> the 
<span class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> were <span 
class="removed"><del><strong>programmed</strong></del></span>
-    <span class="inserted"><ins><em>found</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information</em></ins></span> 
about <span class="inserted"><ins><em>its users.
+    It could be designed so that users communicate such info to each
+    other but not to</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
-    source code they cannot look at.</em></ins></span>  The other <span 
class="removed"><del><strong>day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
-    in</em></ins></span> other <span class="removed"><del><strong>way.&rdquo; 
Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed to</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
+    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> the <span class="removed"><del><strong>image is 
coming</strong></del></span> <span class="inserted"><ins><em>proprietary apps 
by getting apps</em></ins></span> from the <span 
class="removed"><del><strong>user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable</strong></del></span> <span class="inserted"><ins><em>free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>surveillance, 
even</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> if <span 
class="removed"><del><strong>it were not hidden as it was in
-    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users</em></ins></span> are <span 
class="removed"><del><strong>totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>HIV-positive, 
then provides</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV will</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should</em></ins></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>have so much information about its users.
-    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>TVs are</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
-    other but</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> to <span 
class="removed"><del><strong>report what</strong></del></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy</em></ins></span> on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>users even more 
than users expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP 
address&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>after 
going to a movie&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span>
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
+&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up to me</strong></del></span> <span class="inserted"><ins><em>physical 
store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    uploads all phone numbers</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
     book to developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded &lt;a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls</em></ins></span> and <span class="inserted"><ins><em>sent them and 
text messages and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
+    &lt;p&gt;Google did</em></ins></span> not <span 
class="removed"><del><strong>just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the <span class="removed"><del><strong>image is 
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of 
these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>other 
hand, Google redistributes nonfree Android apps, and
+    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span class="inserted"><ins><em>responsibility 
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their 
being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="inserted"><ins><em>better job of preventing apps from
+    cheating? There is no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+    to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in</strong></del></span> <span class="inserted"><ins><em>source code 
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not 
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and 
study</em></ins></span>
+    the <span class="removed"><del><strong>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>source code somehow to determine whether they 
mistreat users in
+    various ways. If it did a good job of this, it could 
more</em></ins></span> or less <span class="removed"><del><strong>all 
&ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span>
+    <span class="inserted"><ins><em>prevent such snooping, except 
when</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    enough</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public,</em></ins></span> so <span class="inserted"><ins><em>we can depend 
on each other.&lt;/p&gt;
+    Google to protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend</em></ins></span> 
on 
+      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>each 
other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that</em></ins></span> track <span 
class="removed"><del><strong>you 
-      across devices.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being 
watched</strong></del></span>
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to <span class="inserted"><ins><em>ultrasound from beacons placed in 
stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
+      social media participation, Tivo can now</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound 
from beacons placed in stores or played</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and</strong></del></span> TV <span 
class="removed"><del><strong>advertisements play inaudible 
sounds</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>do lots 
of surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
+      range so as to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2476,8 +2494,9 @@
   &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
-    are nearby.  Once your Internet devices are paired with
+    on other devices in range so as to</em></ins></span> determine that they
+    are <span class="removed"><del><strong>nearby.  Once your
+      Internet devices are paired</strong></del></span> <span 
class="inserted"><ins><em>nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
@@ -2868,8 +2887,8 @@
 
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
-    turn <span class="inserted"><ins><em>it into a listening device&lt;/a&gt; 
for them.&lt;/p&gt;
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
@@ -2948,17 +2967,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>an Android 
app &lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+  &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
@@ -2979,46 +2996,37 @@
     upload data to AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
-    disconnect its cellular antenna and its GPS antenna.  If you want
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can
+      <span class="removed"><del><strong>correlate ads</strong></del></span>
+    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If you want
     GPS navigation, get a separate navigator which runs free software
-    and works</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>Open Street Map.&lt;/p&gt;
+    and works</em></ins></span> with <span class="removed"><del><strong>Web 
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street 
Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
-    the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data is nearly impossible, 
as it involves
-    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
+      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>a junkyard the 
driver's personal data goes with
+    when they go to a junkyard the driver's personal data goes with
     them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>the 
internal car network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of 
data,
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
-    key is removed, and users report</em></ins></span> that they <span 
class="removed"><del><strong>are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can't disable it.&lt;/p&gt;
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
@@ -3634,7 +3642,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.361
retrieving revision 1.362
diff -u -b -r1.361 -r1.362
--- proprietary-surveillance.it.po      17 Oct 2020 08:05:10 -0000      1.361
+++ proprietary-surveillance.it.po      2 Nov 2020 15:03:00 -0000       1.362
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -527,6 +527,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a href=\"http://www.bbc.com/news/";
 "technology-42309371\">includes a proprietary keyboard driver with a key "
 "logger in it</a>."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary-surveillance.ja-diff.html       17 Oct 2020 08:05:10 -0000      
1.219
+++ proprietary-surveillance.ja-diff.html       2 Nov 2020 15:03:00 -0000       
1.220
@@ -275,6 +275,15 @@
   &lt;li&gt;&lt;p&gt;By</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -601,132 +610,137 @@
   legitimate,</strong></del></span> <span class="inserted"><ins><em>Biden's 
app has a less manipulative overall
     approach,</em></ins></span> but <span class="removed"><del><strong>is that 
valid?  Software developers have no right to
   analyze what users are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> that <span class="removed"><del><strong>snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  just as wrong</strong></del></span> <span class="inserted"><ins><em>does not 
tell us whether it has functionalities we
+    consider malicious, such</em></ins></span> as <span 
class="removed"><del><strong>any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but</strong></del></span> <span 
class="inserted"><ins><em>does</em></ins></span> not <span 
class="removed"><del><strong>&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect to 100
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but</strong></del></span> <span 
class="inserted"><ins><em>sending data the user has</em></ins></span> not <span 
class="removed"><del><strong>&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect</strong></del></span> <span class="inserted"><ins><em>explicitly
+    asked</em></ins></span> to <span class="removed"><del><strong>100
       &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>tell us whether 
it has functionalities we
-    consider malicious, such as sending data</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has not explicitly
-    asked to send.&lt;/p&gt;</em></ins></span>
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
+      Some Motorola</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices 
when</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure</em></ins></span> they <span 
class="removed"><del><strong>are sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="inserted"><ins><em>Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
-    smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
-    retrieve geo-location</em></ins></span> data <span 
class="inserted"><ins><em>from the GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;</em></ins></span>
+    people through &ldquo;their&rdquo;</em></ins></span> phones <span 
class="removed"><del><strong>modify Android to</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    smartphones&lt;/a&gt; by sending</em></ins></span> hidden <span 
class="removed"><del><strong>general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS &lt;a
-    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>text messages which enable
+    them</em></ins></span> to <span class="removed"><del><strong>any 
file</strong></del></span> <span class="inserted"><ins><em>turn the 
phones</em></ins></span> on <span class="inserted"><ins><em>and off, listen 
to</em></ins></span> the <span class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareIniThings"&gt;iThings&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
+    from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311120"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</em></ins></span>
+    lots of <span class="removed"><del><strong>personal data to Apple's 
servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202009183"&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
-    camera.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M202004200"&gt;
-    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice</em></ins></span> of <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>surreptitiously activating the Siri 
software</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009183"&gt;
+    &lt;p&gt;Facebook &lt;a
+    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt; users by surreptitously turning 
on</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device's
+    camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make 
an</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports 
that</em></ins></span> Apple <span 
class="removed"><del><strong>ID</strong></del></span>
+    <span class="inserted"><ins><em>made a practice of surreptitiously 
activating the Siri software to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
-    &lt;p&gt;His job was to listen to these recordings, in</em></ins></span> a 
<span class="removed"><del><strong>server every phone 
number</strong></del></span> <span class="inserted"><ins><em>group that made
+    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span> <span 
class="inserted"><ins><em>listen to these recordings, in</em></ins></span> a 
<span class="removed"><del><strong>valid email address</strong></del></span> 
<span class="inserted"><ins><em>group that made
     transcripts of them. He does not believes that Apple has ceased this
     practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way to prevent this is, for the 
program</em></ins></span> that
-    <span class="inserted"><ins><em>controls access to the microphone to 
decide when</em></ins></span> the user <span class="removed"><del><strong>types 
into it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>has
-    &ldquo;activated&rdquo; any service, to be free software, 
and</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
-        days.&lt;/p&gt;
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> the <span 
class="removed"><del><strong>code</strong></del></span>
+    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
+    sure</em></ins></span> Apple
+      <span class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>can't listen</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot</strong></del></span>
-    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could</em></ins></span> make <span 
class="removed"><del><strong>an</strong></del></span>
-    <span class="inserted"><ins><em>sure</em></ins></span> Apple <span 
class="removed"><del><strong>ID</strong></del></span> <span 
class="inserted"><ins><em>can't listen to them.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>check URLs that possibly correspond to
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910131"&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to</em></ins></span> the 
<span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list</em></ins></span> most <span 
class="removed"><del><strong>popular iOS apps
+    with the Chinese government, its Safe Browsing black 
list</em></ins></span> most <span class="removed"><del><strong>popular iOS apps
   &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
   behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
     contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
@@ -747,21 +761,16 @@
     <span class="inserted"><ins><em>privacy, iPhone apps contain trackers 
that</em></ins></span> are <span class="removed"><del><strong>automatically 
updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>busy 
at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.)</strong></del></span>
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature 
is</strong></del></span> <span class="inserted"><ins><em>busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify,</em></ins></span> The <span 
class="removed"><del><strong>iCloud feature is
-      &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>Washington Post, The Weather
-    Channel (owned</em></ins></span> by <span 
class="inserted"><ins><em>IBM),</em></ins></span> the
-      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
     and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>these 
send personally identifying data such as phone
+    trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
@@ -816,11 +825,11 @@
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the
     startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> is a way to
+    &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
     iCloud&lt;/a&gt;, but it's active by default so it still counts as a
     surveillance functionality.&lt;/p&gt;
@@ -831,14 +840,17 @@
     security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+      the</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
+      and get</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
@@ -851,19 +863,19 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the &lt;a
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"</em></ins></span>
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;
+    get</em></ins></span> other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There 
is</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
@@ -880,7 +892,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is</em></ins></span> also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
@@ -933,39 +945,34 @@
       by sending hidden text messages which enable them to 
turn</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
     many actions</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>the microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>a song.  They 
send device identifying
+      on</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
+    visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other nonfree programs snoop too. For instance, 
Spotify</em></ins></span> and <span class="removed"><del><strong>web
-      browsing history,</strong></del></span>
-    <span class="inserted"><ins><em>other streaming dis-services make a 
dossier about each user,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Other nonfree programs snoop too. For instance, 
Spotify</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span>
+    <span class="inserted"><ins><em>other streaming dis-services make a 
dossier about each user, and &lt;a
     href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
+    users identify themselves</em></ins></span> to <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>same wrongs when 
the culprits are not Chinese,
+    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the 
culprits are not Chinese,
     but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
+  &lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
+    in airplane mode. It didn't send</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -986,17 +993,20 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
+    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much</em></ins></span> 
data that their
+    that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
     of some
@@ -1065,12 +1075,12 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+        movements before and after</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>personal details of users that install the 
app&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a 
protection against massive
         surveillance.&lt;/p&gt;
@@ -1143,7 +1153,10 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM</strong></del></span>
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1161,10 +1174,7 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
+    &lt;p&gt;Some Avast and AVG extensions
     for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
     snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>Google
@@ -1224,17 +1234,17 @@
     surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="inserted"><ins><em>be a &lt;a
-    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>that is a good
-    reason to use free software instead.&lt;/p&gt;
+    &lt;p&gt;The ToToc messaging app seems to be a</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>government of the United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and that</em></ins></span> is 
<span class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>a good
+    reason</em></ins></span> to <span class="inserted"><ins><em>use free 
software instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo;</em></ins></span> in
+    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;free&rdquo;</em></ins></span> in
     the
       <span class="removed"><del><strong>phone.&lt;/p&gt;
 
@@ -1301,20 +1311,28 @@
     functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>the NSA takes 
advantage to spy through it too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage to spy through it 
too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1325,14 +1343,7 @@
 &lt;ul&gt;
 
    &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program</em></ins></span> for <span 
class="removed"><del><strong>collecting lots</strong></del></span> <span 
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or 
more</em></ins></span> people <span 
class="removed"><del><strong>use</strong></del></span>
+    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>list</em></ins></span> of <span 
class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or 
more</em></ins></span> people <span 
class="removed"><del><strong>use</strong></del></span>
     <span class="inserted"><ins><em>who have installed</em></ins></span> 
it&lt;/a&gt;.&lt;/p&gt;
 
        <span class="removed"><del><strong>&lt;p&gt;The company's statement 
that it anonymizes the data may</strong></del></span>
@@ -1406,53 +1417,146 @@
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>insurance 
companies&lt;/a&gt;. Even though the
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even though the
     data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
     traced back to the woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>do so. A
     free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    spying</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>you 
is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>new 
one</em></ins></span> is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>being 
developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the phone has</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>location data to 
Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>Parliament
+  this way, because they</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    the data, or</em></ins></span> pass it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access to
+    the network but no direct access to the data. This 
results</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>massive
+    surveillance on which the user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against 
people</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>buried in
+    lengthy terms of service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201902230"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
@@ -1460,7 +1564,7 @@
     way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>trust a nonfree program, not even the
     developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1470,23 +1574,28 @@
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
+    that</em></ins></span> the
+      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
@@ -2276,17 +2385,15 @@
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
     and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
@@ -2329,22 +2436,18 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
@@ -2359,8 +2462,7 @@
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>its users through 
the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
@@ -2371,21 +2473,18 @@
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how 
people</em></ins></span>
-    used <span class="removed"><del><strong>did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't</em></ins></span> really
-<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>matter. If it had sold the data to a data
+    true, but it doesn't really matter. If it had sold the data to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
     the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
@@ -2410,79 +2509,53 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
+    crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;p&gt;Many employers are using nonfree
     software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>effect a malicious
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
-    &lt;p&gt;Google Nest</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
@@ -2514,82 +2587,43 @@
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
-    when <span class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+    way to see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
     should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+  &lt;li id="M201905061"&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="inserted"><ins><em>sends
+    recordings made without a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, 
where</em></ins></span> they <span class="removed"><del><strong>report even 
which page</strong></del></span> <span class="inserted"><ins><em>can be 
accessed by
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>user 
reads</strong></del></span> <span class="inserted"><ins><em>collected 
information doesn't cancel the wrong of
+    deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
     the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' 
life</em></ins></span>
-    at <span class="removed"><del><strong>what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>home, not only in the present, but in the past (and, 
who knows,
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -3450,7 +3484,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.343
retrieving revision 1.344
diff -u -b -r1.343 -r1.344
--- proprietary-surveillance.ja.po      17 Oct 2020 08:05:10 -0000      1.343
+++ proprietary-surveillance.ja.po      2 Nov 2020 15:03:00 -0000       1.344
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -423,6 +423,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a href=\"http://www.bbc.com/news/";
 "technology-42309371\">includes a proprietary keyboard driver with a key "
 "logger in it</a>."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary-surveillance.pot        17 Oct 2020 08:05:10 -0000      1.282
+++ proprietary-surveillance.pot        2 Nov 2020 15:03:00 -0000       1.283
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -321,6 +321,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a "
+"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
+"users to create an account on their network</a> to be able to install and "
+"use the Windows operating system, which is malware. The account can be used "
+"for surveillance and/or violating people's rights in many ways, such as "
+"turning their purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a "
 "href=\"http://www.bbc.com/news/technology-42309371\";>includes a proprietary "
 "keyboard driver with a key logger in it</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.639
retrieving revision 1.640
diff -u -b -r1.639 -r1.640
--- proprietary-surveillance.ru.po      19 Oct 2020 10:00:05 -0000      1.639
+++ proprietary-surveillance.ru.po      2 Nov 2020 15:03:00 -0000       1.640
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -376,6 +377,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "HP's proprietary operating system <a href=\"http://www.bbc.com/news/";
 "technology-42309371\">includes a proprietary keyboard driver with a key "
 "logger in it</a>."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.de-diff.html    2 Nov 2020 11:01:44 -0000       1.185
+++ proprietary.de-diff.html    2 Nov 2020 15:03:00 -0000       1.186
@@ -212,6 +212,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -226,9 +235,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
-communications between parent and child and spoof messages to and from 
-the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -250,15 +257,6 @@
     taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -322,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary.de.po   2 Nov 2020 11:01:44 -0000       1.225
+++ proprietary.de.po   2 Nov 2020 15:03:00 -0000       1.226
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -523,16 +533,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary.es.po   2 Nov 2020 11:01:44 -0000       1.332
+++ proprietary.es.po   2 Nov 2020 15:03:00 -0000       1.333
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -323,6 +323,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -394,22 +404,6 @@
 "beneficiarse de las «funcionalidades avanzadas» del aparato a menos que "
 "paguen una tarifa mensual."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Muchos empresarios están utilizando software privativo, incluido software de 
"
-"videoconferencia, para <a href=\"https://www.theguardian.com/world/2020/";
-"sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
-"surveillance\">vigilar y monitorizar el trabajo de los empleados en casa</"
-"a>. Si el programa informa de si la persona está «activa», esa es en 
efecto "
-"una característica maliciosa de vigilancia."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,3 +483,18 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are &ldquo;active,&rdquo; that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "Muchos empresarios están utilizando software privativo, incluido software 
"
+#~ "de videoconferencia, para <a href=\"https://www.theguardian.com/";
+#~ "world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-"
+#~ "up-remote-surveillance\">vigilar y monitorizar el trabajo de los "
+#~ "empleados en casa</a>. Si el programa informa de si la persona está "
+#~ "«activa», esa es en efecto una característica maliciosa de vigilancia."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.374
retrieving revision 1.375
diff -u -b -r1.374 -r1.375
--- proprietary.fr.po   2 Nov 2020 11:01:44 -0000       1.374
+++ proprietary.fr.po   2 Nov 2020 15:03:00 -0000       1.375
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-10-29 09:49+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -319,6 +319,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -391,22 +401,6 @@
 "ancrage en un abonnement</a> qui interdit aux utilisateurs de profiter des "
 "« fonctionnalités avancées » à moins de payer une cotisation 
mensuelle."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"De nombreux employeurs utilisent du logiciel non libre, de vidéo-conférence 
"
-"en particulier, pour <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\">surveiller et vérifier le télétravail de leurs collaborateurs</a>. "
-"Lorsqu'un programme rapporte si on est « actif » ou non, il contient en 
fait "
-"une fonctionnalité malveillante."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +475,21 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are &ldquo;active,&rdquo; that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "De nombreux employeurs utilisent du logiciel non libre, de vidéo-"
+#~ "conférence en particulier, pour <a href=\"https://www.theguardian.com/";
+#~ "world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-"
+#~ "up-remote-surveillance\">surveiller et vérifier le télétravail de leurs 
"
+#~ "collaborateurs</a>. Lorsqu'un programme rapporte si on est « actif » 
ou "
+#~ "non, il contient en fait une fonctionnalité malveillante."
+
+#~ msgid ""
 #~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/";
 #~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
 #~ "Instagram</a> users by surreptitously turning on the device's camera."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary.it-diff.html    2 Nov 2020 11:01:44 -0000       1.197
+++ proprietary.it-diff.html    2 Nov 2020 15:03:00 -0000       1.198
@@ -58,9 +58,8 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -225,9 +234,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
-communications between parent and child and spoof messages to and from 
-the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -249,15 +256,6 @@
     taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -321,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary.it.po   2 Nov 2020 11:01:44 -0000       1.234
+++ proprietary.it.po   2 Nov 2020 15:03:00 -0000       1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -516,16 +526,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.ja-diff.html    2 Nov 2020 11:01:44 -0000       1.202
+++ proprietary.ja-diff.html    2 Nov 2020 15:03:00 -0000       1.203
@@ -55,8 +55,8 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -155,11 +155,11 @@
   &lt;td&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -210,6 +210,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -224,9 +233,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
-communications between parent and child and spoof messages to and from 
-the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -248,15 +255,6 @@
     taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -320,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.ja.po   2 Nov 2020 11:01:44 -0000       1.218
+++ proprietary.ja.po   2 Nov 2020 15:03:00 -0000       1.219
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -374,16 +384,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.nl-diff.html    2 Nov 2020 11:01:44 -0000       1.198
+++ proprietary.nl-diff.html    2 Nov 2020 15:03:00 -0000       1.199
@@ -211,6 +211,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -225,9 +234,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
-communications between parent and child and spoof messages to and from 
-the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -249,15 +256,6 @@
     taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -321,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.nl.po   2 Nov 2020 11:01:44 -0000       1.208
+++ proprietary.nl.po   2 Nov 2020 15:03:00 -0000       1.209
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -419,16 +429,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.215
retrieving revision 1.216
diff -u -b -r1.215 -r1.216
--- proprietary.pl-diff.html    2 Nov 2020 11:01:44 -0000       1.215
+++ proprietary.pl-diff.html    2 Nov 2020 15:03:00 -0000       1.216
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -155,17 +155,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -210,6 +210,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -224,9 +233,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
-communications between parent and child and spoof messages to and from 
-the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -248,15 +255,6 @@
     taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -320,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.pl.po   2 Nov 2020 11:01:44 -0000       1.201
+++ proprietary.pl.po   2 Nov 2020 15:03:00 -0000       1.202
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -600,16 +610,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.pot     2 Nov 2020 11:01:44 -0000       1.198
+++ proprietary.pot     2 Nov 2020 15:03:00 -0000       1.199
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a "
+"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
+"users to create an account on their network</a> to be able to install and "
+"use the Windows operating system, which is malware. The account can be used "
+"for surveillance and/or violating people's rights in many ways, such as "
+"turning their purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a "
 
"href=\"https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world\";>coerces
 "
 "players to spend money by overwhelming the game play with loot boxes</a>."
@@ -308,16 +318,6 @@
 "pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a "
-"href=\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance\";>
 "
-"surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary.pt-br-diff.html 2 Nov 2020 11:01:44 -0000       1.7
+++ proprietary.pt-br-diff.html 2 Nov 2020 15:03:00 -0000       1.8
@@ -194,83 +194,82 @@
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that 
bosses</strong></del></span> <span class="inserted"><ins><em>id="M202010220"&gt;
-    &lt;p&gt;The addictive Genshin Impact relentlessly</em></ins></span> &lt;a
+    &lt;p&gt;&ldquo;Bossware&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>id="M201912160"&gt;
+    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>malware that bosses</strong></del></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy on them.&lt;/p&gt;
+    bosses can spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account</em></ins></span> on <span 
class="removed"><del><strong>them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring</strong></del></span> <span 
class="inserted"><ins><em>their network&lt;/a&gt; to be able to install
+    and use</em></ins></span> the <span class="removed"><del><strong>user's 
&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is 
<span class="removed"><del><strong>not
+    an adequate basis for protecting digital privacy.</strong></del></span> 
<span class="inserted"><ins><em>malware.</em></ins></span> The <span 
class="removed"><del><strong>boss</strong></del></span> <span 
class="inserted"><ins><em>account</em></ins></span> can <span 
class="removed"><del><strong>coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should</strong></del></span>
+    be <span class="removed"><del><strong>prosecuted</strong></del></span> 
<span class="inserted"><ins><em>used</em></ins></span> for <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance and/or violating people's rights in many 
ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable 
exposure</strong></del></span>
+  &lt;li <span class="removed"><del><strong>id="M201504210"&gt;
+    &lt;p&gt;Runescape is a popular online game with some &lt;a
+    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>id="M202010220"&gt;
+    &lt;p&gt;The</em></ins></span> addictive <span 
class="removed"><del><strong>features&lt;/a&gt; derived 
from</strong></del></span> <span class="inserted"><ins><em>Genshin Impact 
relentlessly</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    behavioral manipulation techniques&lt;/a&gt;. Certain
+    repetitive aspects of the game, like &lt;a
+    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
+    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
+    thus encourage children and impressionable people</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
-    players</em></ins></span> to <span class="removed"><del><strong>contagious 
disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spend money 
by overwhelming the game play with loot
+    players</em></ins></span> to spend money <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>by overwhelming</em></ins></span> the <span 
class="removed"><del><strong>game.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>game play with loot
     boxes&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="M201504210"&gt;
-    &lt;p&gt;Runescape is a popular online game</strong></del></span> <span 
class="inserted"><ins><em>id="M202009100"&gt;
-    &lt;p&gt;Internet-enabled watches</em></ins></span> with <span 
class="removed"><del><strong>some &lt;a
-    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
-    addictive features&lt;/a&gt; derived from &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
-    behavioral manipulation techniques&lt;/a&gt;. Certain
-    repetitive aspects</strong></del></span> <span 
class="inserted"><ins><em>proprietary software
-    are malware, violating people (specially children's)
-    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>the game, like</strong></del></span> <span 
class="inserted"><ins><em>security flaws. They</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
-    grinding&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+  &lt;li <span class="removed"><del><strong>id="M202006260"&gt;
+    &lt;p&gt;Most apps</strong></del></span> <span 
class="inserted"><ins><em>id="M202009100"&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary 
software</em></ins></span>
+    are malware, <span class="removed"><del><strong>but
+    Trump's campaign app, like Modi's campaign app, is &lt;a
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says that Biden's app has</strong></del></span> <span 
class="inserted"><ins><em>violating people (specially children's)
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>less manipulative overall
+    approach, but</strong></del></span> <span class="inserted"><ins><em>lot of 
security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people</em></ins></span> can 
<span class="removed"><del><strong>be minimised by becoming a paying 
member,</strong></del></span> <span class="inserted"><ins><em>intercept 
-communications between parent</em></ins></span> and <span 
class="removed"><del><strong>can
-    thus encourage children</strong></del></span> <span 
class="inserted"><ins><em>child</em></ins></span> and <span 
class="removed"><del><strong>impressionable people</strong></del></span> <span 
class="inserted"><ins><em>spoof messages</em></ins></span> to <span 
class="removed"><del><strong>spend money on</strong></del></span> <span 
class="inserted"><ins><em>and from 
-the watch, possibly endangering the child.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>game.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>word &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>does not tell us whether it has functionalities we
+    consider malicious, such as sending data</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>user has not explicitly
+    asked</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;</em></ins></span>
+    to <span 
class="removed"><del><strong>send.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean 
&ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="M202006260"&gt;
-    &lt;p&gt;Most apps are malware, but
-    Trump's campaign app, like Modi's campaign app, is</strong></del></span> 
<span class="inserted"><ins><em>id="M202003110"&gt;
+  &lt;li <span class="removed"><del><strong>id="M202006250"&gt;
+    &lt;p&gt;TV manufacturers are able to</strong></del></span> <span 
class="inserted"><ins><em>id="M202003110"&gt;
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on users as well
-    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. 
This</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M202007270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article says that Biden's 
app has</strong></del></span> <span class="inserted"><ins><em>Mellow sous-vide 
cooker is
-    tethered to</em></ins></span> a <span class="removed"><del><strong>less 
manipulative overall
-    approach, but that does not tell us whether it has functionalities we
-    consider malicious, such as sending data</strong></del></span> <span 
class="inserted"><ins><em>server. The company suddenly &lt;a
+  &lt;li id="M202007270"&gt;
+    &lt;p&gt;The Mellow sous-vide cooker</em></ins></span> is <span 
class="removed"><del><strong>illegal due</strong></del></span>
+    <span class="inserted"><ins><em>tethered</em></ins></span> to <span 
class="inserted"><ins><em>a server. The company suddenly &lt;a
     
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
     turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of</em></ins></span> the <span 
class="removed"><del><strong>user has not explicitly
-    asked to send.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;advanced features&rdquo; of the cooker
+    taking advantage of</em></ins></span> the <span 
class="removed"><del><strong>Video Privacy Protection Act</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;advanced 
features&rdquo;</em></ins></span> of <span class="removed"><del><strong>1988, 
but they're circumventing
+    it through EULAs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the cooker
     unless they pay a monthly fee.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  &lt;li <span class="removed"><del><strong>id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>id="M202009270"&gt;
-    &lt;p&gt;Many employers</em></ins></span> are <span 
class="removed"><del><strong>able</strong></del></span> <span 
class="inserted"><ins><em>using nonfree
-    software, including videoconference software,</em></ins></span> to &lt;a
-    <span 
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If</em></ins></span> 
the <span class="removed"><del><strong>user is watching&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>program reports
-    whether you are &ldquo;active,&rdquo; that</em></ins></span> is <span 
class="removed"><del><strong>illegal due to
-    the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in effect a malicious
-    surveillance feature.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;
@@ -333,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- proprietary.pt-br.po        2 Nov 2020 11:01:44 -0000       1.333
+++ proprietary.pt-br.po        2 Nov 2020 15:03:00 -0000       1.334
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -318,6 +318,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -370,16 +380,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.410
retrieving revision 1.411
diff -u -b -r1.410 -r1.411
--- proprietary.ru.po   2 Nov 2020 12:32:15 -0000       1.410
+++ proprietary.ru.po   2 Nov 2020 15:03:00 -0000       1.411
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +319,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -389,22 +400,6 @@
 "запретив пользователям применять 
&ldquo;прогрессивные функции&rdquo; "
 "оборудования, если те не вносят 
ежемесячную плату."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Многие радотодатели пользуются 
несвободными программами, в том числе "
-"программами видеоконференций, чтобы <a 
href=\"https://www.theguardian.com/";
-"world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-"
-"remote-surveillance\"> следить и наблюдать за 
сотрудниками, работающими "
-"дома</a>. Если программа сообщает, что вы 
&ldquo;активны&rdquo;, это "
-"фактически представляет вредоносную 
функцию слежки."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +476,21 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are &ldquo;active,&rdquo; that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "Многие радотодатели пользуются 
несвободными программами, в том числе "
+#~ "программами видеоконференций, чтобы <a 
href=\"https://www.theguardian.com/";
+#~ "world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-"
+#~ "up-remote-surveillance\"> следить и наблюдать за 
сотрудниками, "
+#~ "работающими дома</a>. Если программа 
сообщает, что вы &ldquo;"
+#~ "активны&rdquo;, это фактически 
представляет вредоносную функцию слежки."
+
+#~ msgid ""
 #~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/";
 #~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
 #~ "Instagram</a> users by surreptitously turning on the device's camera."

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.tr.po   2 Nov 2020 11:01:44 -0000       1.67
+++ proprietary.tr.po   2 Nov 2020 15:03:01 -0000       1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-10-29 17:46+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -314,6 +314,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -384,22 +394,6 @@
 "aylık bir ücret ödemedikleri takdirde kullanıcıların pişiricinin 
&ldquo;"
 "gelişmiş özelliklerinden&rdquo; yararlanmalarını yasaklıyor."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Çoğu çalışan özgür olmayan yazılım kullanıyor, bunların 
içerisinde <a href="
-"\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-";
-"feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde çalışan "
-"personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var. 
Eğer "
-"program &ldquo;etkin&rdquo; olup olmadığınızı bildiriyorsa, bu aslında "
-"kötücül bir gözetim özelliğidir."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +475,21 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are &ldquo;active,&rdquo; that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "Çoğu çalışan özgür olmayan yazılım kullanıyor, bunların 
içerisinde <a "
+#~ "href=\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-";
+#~ "staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde 
çalışan "
+#~ "personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var. "
+#~ "Eğer program &ldquo;etkin&rdquo; olup olmadığınızı bildiriyorsa, bu "
+#~ "aslında kötücül bir gözetim özelliğidir."
+
+#~ msgid ""
 #~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/";
 #~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
 #~ "Instagram</a> users by surreptitously turning on the device's camera."

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary.zh-cn.po        2 Nov 2020 11:01:44 -0000       1.73
+++ proprietary.zh-cn.po        2 Nov 2020 15:03:01 -0000       1.74
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-10-19 11:31+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -296,6 +296,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -356,20 +366,6 @@
 
"surprise-27630842/\">把绑定改为注册</a>,如果用户不付月租费,那么他们就不能使"
 "用电饭煲的某些 &ldquo;高级功能&rdquo;。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"许多雇主使用非自由软件,包括视频会议软件,来 <a 
href=\"https://www.";
-"theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-"
-"bosses-ramp-up-remote-surveillance\">监视和监控在家办å…
¬çš„员工</a>。如果该程序"
-"汇报你是否 &ldquo;在活跃(工作),&rdquo;那么它实际
上就是在监视。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -454,6 +450,19 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are &ldquo;active,&rdquo; that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "许多雇主使用非自由软件,包括视频会议软件,来 <a 
href=\"https://www.";
+#~ "theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-"
+#~ "as-bosses-ramp-up-remote-surveillance\">监视和监控在家办å…
¬çš„员工</a>。如果"
+#~ "该程序汇报你是否 
&ldquo;在活跃(工作),&rdquo;那么它实际上就是在监视。"
+
+#~ msgid ""
 #~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/";
 #~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
 #~ "Instagram</a> users by surreptitously turning on the device's camera."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary.zh-tw-diff.html 2 Nov 2020 11:01:44 -0000       1.178
+++ proprietary.zh-tw-diff.html 2 Nov 2020 15:03:01 -0000       1.179
@@ -212,6 +212,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -226,9 +235,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
-communications between parent and child and spoof messages to and from 
-the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -250,15 +257,6 @@
     taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -322,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:01 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.zh-tw.po        2 Nov 2020 11:01:44 -0000       1.188
+++ proprietary.zh-tw.po        2 Nov 2020 15:03:01 -0000       1.189
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "
@@ -489,16 +499,6 @@
 "advanced features&rdquo; of the cooker unless they pay a monthly fee."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- pt-br.po    2 Nov 2020 11:01:44 -0000       1.287
+++ pt-br.po    2 Nov 2020 15:03:01 -0000       1.288
@@ -4974,6 +4974,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -8810,16 +8820,6 @@
 "<small>Nota: este artigo faz uso da palavra “<i lang=\"en\">free</i>” no "
 "sentido de “grátis”.</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -9591,6 +9591,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.490
retrieving revision 1.491
diff -u -b -r1.490 -r1.491
--- ru.po       2 Nov 2020 11:59:52 -0000       1.490
+++ ru.po       2 Nov 2020 15:03:01 -0000       1.491
@@ -6125,6 +6125,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -10679,22 +10689,6 @@
 "words-to-avoid.html#Hacker\">хакеры</a>&rdquo; неверно 
используется для "
 "обозначения взломщиков.</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Многие радотодатели пользуются 
несвободными программами, в том числе "
-"программами видеоконференций, чтобы <a 
href=\"https://www.theguardian.com/";
-"world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-"
-"remote-surveillance\"> следить и наблюдать за 
сотрудниками, работающими "
-"дома</a>. Если программа сообщает, что вы 
&ldquo;активны&rdquo;, это "
-"фактически представляет вредоносную 
функцию слежки."
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -11588,6 +11582,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"Многие радотодатели пользуются 
несвободными программами, в том числе "
+"программами видеоконференций, чтобы <a 
href=\"https://www.theguardian.com/";
+"world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-"
+"remote-surveillance\"> следить и наблюдать за 
сотрудниками, работающими "
+"дома</a>. Если программа сообщает, что вы 
&ldquo;активны&rdquo;, это "
+"фактически представляет вредоносную 
функцию слежки."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- tr.po       2 Nov 2020 11:01:45 -0000       1.67
+++ tr.po       2 Nov 2020 15:03:01 -0000       1.68
@@ -4393,6 +4393,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7804,22 +7814,6 @@
 "\">üstât (hacker)</a>&rdquo; kelimesini &ldquo;güvenlik kırıcı&rdquo; "
 "anlamında yanlış kullandığını belirtmek isteriz)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Çoğu çalışan özgür olmayan yazılım kullanıyor, bunların 
içerisinde <a href="
-"\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-";
-"feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde çalışan "
-"personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var. 
Eğer "
-"program &ldquo;etkin&rdquo; olup olmadığınızı bildiriyorsa, bu aslında "
-"kötücül bir gözetim özelliğidir."
-
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -8569,6 +8563,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"Çoğu çalışan özgür olmayan yazılım kullanıyor, bunların 
içerisinde <a href="
+"\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-";
+"feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde çalışan "
+"personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var. 
Eğer "
+"program &ldquo;etkin&rdquo; olup olmadığınızı bildiriyorsa, bu aslında "
+"kötücül bir gözetim özelliğidir."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- zh-cn.po    2 Nov 2020 11:01:45 -0000       1.63
+++ zh-cn.po    2 Nov 2020 15:03:01 -0000       1.64
@@ -4318,6 +4318,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7571,20 +7581,6 @@
 "&rdquo;)</small>"
 msgstr "<small>注:这篇文章中“free”的意思是“å…
è´¹çš„”。</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"许多雇主使用非自由软件,包括视频会议软件,来 <a 
href=\"https://www.";
-"theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-"
-"bosses-ramp-up-remote-surveillance\">监视和监控在家办å…
¬çš„员工</a>。如果该程序"
-"汇报你是否 &ldquo;在活跃(工作),&rdquo;那么它实际
上就是在监视。"
-
 #
 #
 #
@@ -8325,6 +8321,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"许多雇主使用非自由软件,包括视频会议软件,来 <a 
href=\"https://www.";
+"theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-"
+"bosses-ramp-up-remote-surveillance\">监视和监控在家办å…
¬çš„员工</a>。如果该程序"
+"汇报你是否 &ldquo;在活跃(工作),&rdquo;那么它实际
上就是在监视。"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- zh-tw.po    2 Nov 2020 11:01:45 -0000       1.223
+++ zh-tw.po    2 Nov 2020 15:03:01 -0000       1.224
@@ -4332,6 +4332,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/";
 "future_tense/2012/07/20/"
 "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7726,16 +7736,6 @@
 "&rdquo;)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
 #
 #
 #
@@ -8502,6 +8502,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are &ldquo;active,&rdquo; that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "&ldquo;Bossware&rdquo; is malware that bosses <a href=\"https://www.eff.org/";
 "deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
 "coerce workers into installing in their own computers</a>, so the bosses can "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]