www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-in-online-conferencing....


From: GNUN
Subject: www/proprietary malware-in-online-conferencing....
Date: Mon, 2 Nov 2020 12:32:46 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/02 12:32:45

Modified files:
        proprietary    : malware-in-online-conferencing.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-games.de-diff.html malware-games.de.po 
                         malware-games.es.po malware-games.fr.po 
                         malware-games.ja-diff.html malware-games.ja.po 
                         malware-games.pot malware-games.ru.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 
Added files:
        proprietary/po : malware-in-online-conferencing.pot 
                         malware-in-online-conferencing.translist 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.395&r2=1.396
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.350&r2=1.351
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.553&r2=1.554
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.640&r2=1.641
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.376&r2=1.377
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.411&r2=1.412
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.491&r2=1.492
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.pot?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.translist?cvsroot=www&rev=1.1

Patches:
Index: malware-in-online-conferencing.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-in-online-conferencing.html 2 Nov 2020 10:34:36 -0000       1.1
+++ malware-in-online-conferencing.html 2 Nov 2020 17:32:37 -0000       1.2
@@ -12,7 +12,7 @@
 <title>Malware in Online Conferencing 
 - GNU Project - Free Software Foundation</title>
 <link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
-<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+ <!--#include 
virtual="/proprietary/po/malware-in-online-conferencing.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <div class="nav">
 <a id="side-menu-button" class="switch" href="#navlinks">
@@ -127,7 +127,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/02 10:34:36 $
+$Date: 2020/11/02 17:32:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/de.po    2 Nov 2020 15:02:53 -0000       1.224
+++ po/de.po    2 Nov 2020 17:32:38 -0000       1.225
@@ -5300,6 +5300,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- po/es.po    2 Nov 2020 15:02:53 -0000       1.320
+++ po/es.po    2 Nov 2020 17:32:38 -0000       1.321
@@ -4879,6 +4879,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.395
retrieving revision 1.396
diff -u -b -r1.395 -r1.396
--- po/fr.po    2 Nov 2020 15:22:50 -0000       1.395
+++ po/fr.po    2 Nov 2020 17:32:38 -0000       1.396
@@ -4351,6 +4351,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/it.po    2 Nov 2020 15:02:55 -0000       1.224
+++ po/it.po    2 Nov 2020 17:32:38 -0000       1.225
@@ -4928,6 +4928,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- po/ja.po    2 Nov 2020 15:02:55 -0000       1.232
+++ po/ja.po    2 Nov 2020 17:32:38 -0000       1.233
@@ -3783,6 +3783,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/malware-games.de-diff.html       28 Oct 2020 23:00:58 -0000      1.47
+++ po/malware-games.de-diff.html       2 Nov 2020 17:32:38 -0000       1.48
@@ -89,14 +89,29 @@
 &lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>program or vice versa&lt;/a&gt;.  It's
-not directly</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or 
<span class="removed"><del><strong>vice versa&lt;/a&gt;.  It's
+not directly</strong></del></span> <span class="inserted"><ins><em>two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-games"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -437,7 +452,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/28 23:00:58 $
+$Date: 2020/11/02 17:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/malware-games.de.po      28 Oct 2020 23:00:58 -0000      1.48
+++ po/malware-games.de.po      2 Nov 2020 17:32:38 -0000       1.49
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -154,6 +154,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-games.es.po      29 Oct 2020 11:29:54 -0000      1.29
+++ po/malware-games.es.po      2 Nov 2020 17:32:38 -0000       1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-10-29 11:43+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -107,6 +108,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- po/malware-games.fr.po      29 Oct 2020 08:51:33 -0000      1.87
+++ po/malware-games.fr.po      2 Nov 2020 17:32:38 -0000       1.88
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-10-29 09:49+0100\n"
 "Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -103,6 +104,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- po/malware-games.ja-diff.html       28 Oct 2020 23:00:58 -0000      1.56
+++ po/malware-games.ja-diff.html       2 Nov 2020 17:32:38 -0000       1.57
@@ -89,14 +89,29 @@
 &lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>program or vice versa&lt;/a&gt;.  It's
-not directly</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or 
<span class="removed"><del><strong>vice versa&lt;/a&gt;.  It's
+not directly</strong></del></span> <span class="inserted"><ins><em>two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-games"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010220"&gt;
     &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
     
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -437,7 +452,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/28 23:00:58 $
+$Date: 2020/11/02 17:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/malware-games.ja.po      28 Oct 2020 23:00:58 -0000      1.48
+++ po/malware-games.ja.po      2 Nov 2020 17:32:38 -0000       1.49
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -121,6 +121,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- po/malware-games.pot        28 Oct 2020 23:00:58 -0000      1.41
+++ po/malware-games.pot        2 Nov 2020 17:32:38 -0000       1.42
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -87,6 +87,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\";>requiring
 "
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a "
 
"href=\"https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world\";>coerces
 "
 "players to spend money by overwhelming the game play with loot boxes</a>."

Index: po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- po/malware-games.ru.po      29 Oct 2020 11:00:28 -0000      1.94
+++ po/malware-games.ru.po      2 Nov 2020 17:32:38 -0000       1.95
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -105,6 +106,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/malware-microsoft.de-diff.html   2 Nov 2020 15:02:55 -0000       1.55
+++ po/malware-microsoft.de-diff.html   2 Nov 2020 17:32:38 -0000       1.56
@@ -313,7 +313,7 @@
     intrusive ads for Microsoft products and its partners'
     products&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article's author starts from the premise that Microsoft has
+    &lt;p&gt;The article's author starts from the premise 
that</em></ins></span> Microsoft <span class="inserted"><ins><em>has
     a right to control what Windows does to users, as long as it doesn't
     go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;
   &lt;/li&gt;
@@ -389,7 +389,7 @@
     tampering with users' settings and files&lt;/a&gt;, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
-    them.</em></ins></span> Microsoft <span 
class="inserted"><ins><em>repeatedly pushed faulty versions of this program to
+    them. Microsoft repeatedly pushed faulty versions of this program to
     users' machines, causing numerous problems, some of which &lt;a
     
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
     critical&lt;/a&gt;.&lt;/p&gt;
@@ -452,12 +452,13 @@
     &lt;p&gt;Once</em></ins></span> Microsoft has tricked a user
     into accepting installation of Windows 10, &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</em></ins></span>
-    find that they are denied <span class="removed"><del><strong>the option to 
cancel or even postpone the
-   imposed date of installation&lt;/a&gt;.
-   &lt;/p&gt;
+    find that they are denied the option to cancel or even postpone the
+    imposed date of <span class="removed"><del><strong>installation&lt;/a&gt;.
+   &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
    &lt;p&gt;This demonstrates what we've said for years: using proprietary
-   software means letting someone have power over you, and you're
-   going to get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
+    software means letting someone have power over you, and you're going
+    to get screwed sooner <span class="removed"><del><strong>or 
later.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
   has &lt;a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
@@ -481,22 +482,17 @@
     is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     forcibly pushing Windows
     update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
-    that you could set</strong></del></span> <span 
class="inserted"><ins><em>the option</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms</strong></del></span> 
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the 
<span class="removed"><del><strong>presence</strong></del></span>
-    <span class="inserted"><ins><em>imposed date</em></ins></span> of
-    <span class="removed"><del><strong>a &lt;a 
href="/proprietary/proprietary-back-doors.html"&gt;universal
-    back door in Windows&lt;/a&gt; 7</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This demonstrates what we've said for years: using proprietary
-    software means letting someone have power over you,</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>you're going
-    to get screwed sooner or later.&lt;/p&gt;
+    that you could set</strong></del></span> <span 
class="inserted"><ins><em>or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
     &lt;p&gt;FTDI's proprietary driver
-    for its USB-to-serial chips has been designed to &lt;a
-    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
+    for its USB-to-serial chips has been designed</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms the presence of
+    a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
     so that they no longer work. Microsoft is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
@@ -542,49 +538,27 @@
     &lt;p&gt;A person or company has the right to cease to work on a particular
     program; the wrong here is Microsoft does this after having made the
     users dependent on Microsoft, because they are not free to ask anyone
-    else to work on the program for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
-
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+    else to work on the program for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201306220"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
-    informs</em></ins></span> the <span class="removed"><del><strong>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples of Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Microsoft is planning to make Windows &lt;a
-      
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
-      impose use</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> of <span 
class="removed"><del><strong>its browser, Edge,</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in <span 
class="removed"><del><strong>certain circumstances&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The reason Microsoft can force things on users is 
that</strong></del></span> Windows <span class="removed"><del><strong>is
-      nonfree.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows displays</strong></del></span> <span 
class="inserted"><ins><em>before fixing them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    informs the NSA of bugs in Windows before fixing them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
-    &lt;p&gt;Microsoft Office forces users</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
-       intrusive ads for Microsoft products and its
-       partners' products&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article's author starts from the premise that Microsoft
-      has a right</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span class="removed"><del><strong>control 
what Windows does</strong></del></span> <span class="inserted"><ins><em>Office 
365</em></ins></span> to <span class="removed"><del><strong>users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
-      annoying advertisements inside of the File 
Explorer&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>be 
able</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Microsoft Office forces users &lt;a
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
+for</strong></del></span> <span class="inserted"><ins><em>Office 365 to be 
able to create/edit documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -592,9 +566,44 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>game</em></ins></span> of <span 
class="inserted"><ins><em>Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's 
network&lt;/a&gt;.</em></ins></span> Microsoft <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft is planning</strong></del></span>
+    <span class="inserted"><ins><em>has bought the game and will merge all 
accounts into its network,
+    which will give them access</em></ins></span> to <span 
class="removed"><del><strong>make Windows &lt;a
+      
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
+      impose use</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage</em></ins></span> of <span 
class="removed"><del><strong>its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The reason Microsoft can force things on 
users</strong></del></span> <span 
class="inserted"><ins><em>Minetest</em></ins></span> is that <span 
class="removed"><del><strong>Windows</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> is
+      <span class="removed"><del><strong>nonfree.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows displays
+      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for Microsoft products and its
+       partners' products&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from</strong></del></span> <span 
class="inserted"><ins><em>free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>premise that Microsoft
+      has</strong></del></span> <span class="inserted"><ins><em>user's 
computer freedom. As</em></ins></span> a <span 
class="removed"><del><strong>right to control what Windows does to users, as 
long as</strong></del></span> <span 
class="inserted"><ins><em>bonus,</em></ins></span>
+    it
+      <span class="removed"><del><strong>doesn't go &ldquo;too far&rdquo;. We 
disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts</strong></del></span> <span 
class="inserted"><ins><em>offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
+    &lt;p&gt;Microsoft is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside of the File Explorer&lt;/a&gt; to 
nag</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
     users to <span class="removed"><del><strong>buy subscriptions for the 
OneDrive service.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>create an account on their network&lt;/a&gt; to be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's</strong></del></span> install <span class="removed"><del><strong>base, 
Microsoft
@@ -1003,7 +1012,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:02:55 $
+$Date: 2020/11/02 17:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- po/malware-microsoft.de.po  2 Nov 2020 15:02:55 -0000       1.151
+++ po/malware-microsoft.de.po  2 Nov 2020 17:32:38 -0000       1.152
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -972,6 +972,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- po/malware-microsoft.es.po  2 Nov 2020 15:02:55 -0000       1.177
+++ po/malware-microsoft.es.po  2 Nov 2020 17:32:38 -0000       1.178
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -774,6 +774,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- po/malware-microsoft.fr.po  2 Nov 2020 15:22:50 -0000       1.194
+++ po/malware-microsoft.fr.po  2 Nov 2020 17:32:38 -0000       1.195
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-11-02 16:21+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -771,6 +772,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- po/malware-microsoft.it-diff.html   2 Nov 2020 15:02:55 -0000       1.54
+++ po/malware-microsoft.it-diff.html   2 Nov 2020 17:32:39 -0000       1.55
@@ -475,22 +475,22 @@
     &lt;p&gt;Once Microsoft has tricked a user
     into accepting installation of Windows 10, &lt;a
     
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that they are denied the option</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms</strong></del></span> 
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the 
<span class="removed"><del><strong>presence</strong></del></span>
-    <span class="inserted"><ins><em>imposed date</em></ins></span> of
-    <span class="removed"><del><strong>a &lt;a 
href="/proprietary/proprietary-back-doors.html"&gt;universal
-    back door in Windows&lt;/a&gt; 7</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
+    find that they are denied the option to cancel or even postpone the
+    imposed date of installation&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This demonstrates what we've said for years: using proprietary
-    software means letting someone have power over you,</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>you're going
+    software means letting someone have power over you, and you're going
     to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
     &lt;p&gt;FTDI's proprietary driver
-    for its USB-to-serial chips has been designed to &lt;a
-    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
+    for its USB-to-serial chips has been designed</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms the presence of
+    a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
     so that they no longer work. Microsoft is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
@@ -536,64 +536,76 @@
     &lt;p&gt;A person or company has the right to cease to work on a particular
     program; the wrong here is Microsoft does this after having made the
     users dependent on Microsoft, because they are not free to ask anyone
-    else to work on the program for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
-
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+    else to work on the program for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201306220"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
-    informs</em></ins></span> the <span class="removed"><del><strong>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> of <span 
class="removed"><del><strong>Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Windows displays
-      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
-       intrusive ads for Microsoft products and its
-       partners' products&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article's author starts from the premise that Microsoft
-      has a right to control what</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span 
class="removed"><del><strong>does to users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Microsoft inserts</strong></del></span> <span 
class="inserted"><ins><em>before fixing them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    informs the NSA of bugs in Windows before fixing them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
-    &lt;p&gt;Microsoft Office forces users</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
-      annoying advertisements inside of the File 
Explorer&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span class="removed"><del><strong>nag
-      users</strong></del></span> <span class="inserted"><ins><em>Office 
365</em></ins></span> to <span class="removed"><del><strong>buy subscriptions 
for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;In order</strong></del></span> <span class="inserted"><ins><em>be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's install base, Microsoft
-&lt;a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice and privacy&lt;/a&gt;.</strong></del></span> 
<span class="inserted"><ins><em>create/edit 
documents&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Microsoft Office forces users &lt;a
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
+for</strong></del></span> <span class="inserted"><ins><em>Office 365 to be 
able to create/edit documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
-started</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>game</em></ins></span> of <span 
class="removed"><del><strong>Microsoft committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Windows displays</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's 
network&lt;/a&gt;.</em></ins></span> Microsoft <span 
class="removed"><del><strong>products</strong></del></span>
+    <span class="inserted"><ins><em>has bought the game</em></ins></span> and 
<span class="inserted"><ins><em>will merge all accounts into</em></ins></span> 
its
+       <span class="removed"><del><strong>partners' 
products&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from the 
premise</strong></del></span> <span class="inserted"><ins><em>network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is</em></ins></span> that 
<span class="removed"><del><strong>Microsoft
+      has</strong></del></span> <span class="inserted"><ins><em>it is free
+    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a <span class="removed"><del><strong>right to control what 
Windows does to users, as long as</strong></del></span> <span 
class="inserted"><ins><em>bonus,</em></ins></span>
+    it
+      <span class="removed"><del><strong>doesn't go &ldquo;too far&rdquo;. We 
disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts</strong></del></span> <span 
class="inserted"><ins><em>offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
+    &lt;p&gt;Microsoft is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside of the File Explorer&lt;/a&gt; to 
nag</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
-    users <span class="removed"><del><strong>obnoxiously and 
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an 
account on their network&lt;/a&gt; to be able</em></ins></span> to install 
<span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    users to <span class="removed"><del><strong>buy subscriptions for the 
OneDrive service.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>create an account on their 
network&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>increase Windows 10's install base, Microsoft
+&lt;a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice and privacy&lt;/a&gt;.
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Microsoft has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
+users obnoxiously and repeatedly</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to install <span 
class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
       &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
@@ -987,7 +999,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:02:55 $
+$Date: 2020/11/02 17:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- po/malware-microsoft.it.po  2 Nov 2020 15:02:59 -0000       1.156
+++ po/malware-microsoft.it.po  2 Nov 2020 17:32:39 -0000       1.157
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -925,6 +925,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/malware-microsoft.ja-diff.html   2 Nov 2020 15:02:59 -0000       1.69
+++ po/malware-microsoft.ja-diff.html   2 Nov 2020 17:32:39 -0000       1.70
@@ -386,11 +386,14 @@
   &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>holds.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;Free software developers also stop maintaining old versions of
-    their programs, but this is not unfair to users because the
-  <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>users of
+    their programs, but this is not unfair to users because the users of
     free software have control over it.  If it is important enough to you,
     you and other users can hire someone to support the old version on
-    your future platforms.&lt;/p&gt;
+    your future <span class="removed"><del><strong>platforms.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+    is</strong></del></span> <span 
class="inserted"><ins><em>platforms.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -404,14 +407,16 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
+    &lt;p&gt;Microsoft has been</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
+    forcibly pushing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
     force-installing a &ldquo;remediation&rdquo;
     program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
+    versions of</em></ins></span> Windows
+    <span class="removed"><del><strong>update</strong></del></span> <span 
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means &lt;a
     
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
+    tampering with users' settings and files&lt;/a&gt;, 
notably</em></ins></span> to <span class="removed"><del><strong>its version 
10&lt;/a&gt;, ignoring</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;repair&rdquo; any components 
of</em></ins></span> the <span 
class="removed"><del><strong>flag</strong></del></span> <span 
class="inserted"><ins><em>updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
     users' machines, causing numerous problems, some of which &lt;a
@@ -431,7 +436,7 @@
 
   &lt;li id="M201704194"&gt;
     &lt;p&gt;Microsoft has made Windows 7
-    and 8 cease to function on certain new computers, &lt;a
+    and 8 cease to function</em></ins></span> on <span 
class="inserted"><ins><em>certain new computers, &lt;a
     
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
     forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -439,7 +444,7 @@
   &lt;li id="M201704134"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+    has dropped support for</em></ins></span> Windows 7 <span 
class="removed"><del><strong>or</strong></del></span> <span 
class="inserted"><ins><em>and 8 on recent processors&lt;/a&gt;
     in a big hurry.&lt;/p&gt;
 
     &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
@@ -449,7 +454,7 @@
 
   &lt;li id="M201606270"&gt;
     &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
-    7 and 8 into installing all-spying Windows 10 against their
+    7 and</em></ins></span> 8 <span class="inserted"><ins><em>into installing 
all-spying Windows 10 against their
     will, Microsoft forced their computers to &lt;a
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
     silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
@@ -459,7 +464,7 @@
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
     jeopardize important operations in regions of the world with poor
     connectivity&lt;/a&gt;, but many of the people who let installation proceed
-    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
+    found out</em></ins></span> that <span class="removed"><del><strong>you 
could set</strong></del></span> <span class="inserted"><ins><em>this 
&ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -468,31 +473,22 @@
     &lt;p&gt;Once Microsoft has tricked a user
     into accepting installation of Windows 10, &lt;a
     
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that they are denied the option to cancel or even postpone the
-    imposed date</em></ins></span> of <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
+    find that they are denied the option</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms</strong></del></span> 
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the 
<span class="removed"><del><strong>presence</strong></del></span>
+    <span class="inserted"><ins><em>imposed date</em></ins></span> of
+    <span class="removed"><del><strong>a &lt;a 
href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This demonstrates what we've said for years: using 
proprietary</em></ins></span>
-    software <span class="inserted"><ins><em>means letting 
someone</em></ins></span> have <span 
class="removed"><del><strong>control</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> over <span 
class="removed"><del><strong>it.  If it is important
-  enough to</strong></del></span> you, <span 
class="removed"><del><strong>you</strong></del></span> and <span 
class="removed"><del><strong>other users can hire someone to support
-  the old version on your future platforms.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you,</em></ins></span> and 
<span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft
-    is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
-    forcibly pushing Windows
-    update</strong></del></span> <span class="inserted"><ins><em>you're 
going</em></ins></span>
-    to <span class="removed"><del><strong>its version 10&lt;/a&gt;, ignoring 
the flag on Windows 7</strong></del></span> <span class="inserted"><ins><em>get 
screwed sooner</em></ins></span> or <span class="removed"><del><strong>8
-    that you could set</strong></del></span> <span 
class="inserted"><ins><em>later.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>you're going
+    to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
     &lt;p&gt;FTDI's proprietary driver
-    for its USB-to-serial chips has been designed</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms the presence of
-    a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;universal
-    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
+    for its USB-to-serial chips has been designed to &lt;a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
     so that they no longer work. Microsoft is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
@@ -551,19 +547,13 @@
 
 &lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
 
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up</strong></del></span> 
<span class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
     
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-
-&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
+    subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -571,6 +561,27 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like sabotage, but they 
are not grave enough</strong></del></span> <span class="inserted"><ins><em>game 
of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for</strong></del></span> <span class="inserted"><ins><em>open an account on 
Microsoft's network&lt;/a&gt;. Microsoft
+    has bought</em></ins></span> the <span class="removed"><del><strong>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty</strong></del></span> <span 
class="inserted"><ins><em>game</em></ins></span> and <span 
class="removed"><del><strong>wrong. This section describes 
examples</strong></del></span> <span class="inserted"><ins><em>will merge all 
accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage</em></ins></span> of <span 
class="removed"><del><strong>Microsoft committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -963,7 +974,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:02:59 $
+$Date: 2020/11/02 17:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/malware-microsoft.ja.po  2 Nov 2020 15:02:59 -0000       1.136
+++ po/malware-microsoft.ja.po  2 Nov 2020 17:32:39 -0000       1.137
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -750,6 +750,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: po/malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- po/malware-microsoft.pot    2 Nov 2020 15:02:59 -0000       1.94
+++ po/malware-microsoft.pot    2 Nov 2020 17:32:39 -0000       1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -535,6 +535,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\";>requiring
 "
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a "
 
"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
 "users to create an account on their network</a> to be able to install and "

Index: po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- po/malware-microsoft.ru.po  2 Nov 2020 15:02:59 -0000       1.234
+++ po/malware-microsoft.ru.po  2 Nov 2020 17:32:39 -0000       1.235
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -769,6 +769,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/nl.po    2 Nov 2020 15:02:59 -0000       1.225
+++ po/nl.po    2 Nov 2020 17:32:39 -0000       1.226
@@ -3564,6 +3564,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/pl.po    2 Nov 2020 15:02:59 -0000       1.224
+++ po/pl.po    2 Nov 2020 17:32:39 -0000       1.225
@@ -3138,6 +3138,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- po/pot      2 Nov 2020 15:02:59 -0000       1.223
+++ po/pot      2 Nov 2020 17:32:39 -0000       1.224
@@ -2908,6 +2908,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/proprietary-surveillance.de-diff.html    2 Nov 2020 15:02:59 -0000       
1.136
+++ po/proprietary-surveillance.de-diff.html    2 Nov 2020 17:32:39 -0000       
1.137
@@ -624,49 +624,21 @@
   &lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>these apps.&lt;/p&gt;
 
-  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their
-    being nonfree. It also distributes its own nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
-    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
-    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span> to <span 
class="removed"><del><strong>see what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> they
-    <span class="removed"><del><strong>do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand the source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the
-    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;On the other hand,</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough</strong></del></span> <span class="inserted"><ins><em>Edward 
Snowden, &lt;a
+    &lt;p&gt;According to Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>phones on and off, 
listen</em></ins></span> to the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
-    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>security
-    of 283 Android VPN apps concluded that &ldquo;in spite of the
-    promises for privacy, security,</strong></del></span> <span 
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by</strong></del></span>
-    <span class="inserted"><ins><em>read</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is 
designed</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed to disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -674,30 +646,20 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android,</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there</em></ins></span> 
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps from
-    the research paper</strong></del></span> <span 
class="inserted"><ins><em>not much
-    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries such as 
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>Appflood,
-      meant</strong></del></span> <span class="inserted"><ins><em>users cannot 
stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
-    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -711,51 +673,25 @@
   &lt;li id="M202009183"&gt;
     &lt;p&gt;Facebook &lt;a
     
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>and show them targeted ads.&lt;/dd&gt;
-
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the 
<span class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full 
access</strong></del></span> <span class="inserted"><ins><em>device's
+    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202004200"&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice of surreptitiously activating the Siri 
software</em></ins></span> to <span class="inserted"><ins><em>&lt;a
+    made a practice of surreptitiously activating the Siri software to &lt;a
     
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
-    record</em></ins></span> users' <span class="removed"><del><strong>text 
messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>conversations 
when they had not activated Siri&lt;/a&gt;.
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
-    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>read logs
-      for other apps and also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> to <span 
class="removed"><del><strong>LinkedIn. Also, it stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>these recordings, in a group that made
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
     transcripts of them. He does not believes that Apple has ceased this
     practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way</em></ins></span> to <span 
class="inserted"><ins><em>prevent this is, for</em></ins></span> the <span 
class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>program that
-    controls access</em></ins></span> to the
-      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>microphone to decide 
when</em></ins></span> the <span class="removed"><del><strong>JS injection 
is</strong></del></span> <span class="inserted"><ins><em>user has
-    &ldquo;activated&rdquo; any service,</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span class="inserted"><ins><em>be free 
software, and</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed</strong></del></span>
-    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
     sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -763,505 +699,302 @@
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
     sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="inserted"><ins><em>possibly correspond to
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="removed"><del><strong>non-premium 
version</strong></del></span> <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list most certainly
-    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="removed"><del><strong>app does
-      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>requests
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
-  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
-    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
-    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>phone
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
-    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
-    used for.&lt;/p&gt;</em></ins></span>
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+  &lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+  &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>transmit users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
-    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
-    them from there.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span>
-    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
+  &lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage app on iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that the user types into it&lt;/a&gt;; the
+    server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
-    and <span class="removed"><del><strong>Conditions&rdquo; that spell out
-what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>honestly 
identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>video you
-    take,</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    and videos they make.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>keeps them up</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
+    take, and keeps them up to date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is
-    <span class="removed"><del><strong>yet another 
example</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup</em></ins></span> of <span class="removed"><del><strong>nonfree 
software pretending</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-    when</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but</em></ins></span> it's <span 
class="removed"><del><strong>actually doing something else.  
Such</strong></del></span> <span class="inserted"><ins><em>active by default so 
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing 
would be almost
-    unthinkable with free software.&lt;/p&gt;
-
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
-    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>the most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span class="removed"><del><strong>their 
users with third parties.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;There is a way to
+    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    surveillance functionality.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>break Apple's
-    security to get at them, but NSA can access any of them 
through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may</em></ins></span> have <span 
class="removed"><del><strong>described these apps as
-  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>improved with &lt;a
+    &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
-    for <span class="removed"><del><strong>granted that the usual analytics 
tools are
-  legitimate, but is that valid?  Software developers 
have</strong></del></span> no <span class="removed"><del><strong>right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>possible purpose</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not</strong></del></span> <span 
class="inserted"><ins><em>than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect to 100</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span>
-    <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>an iThing, or it
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;</em></ins></span>
+    turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also</em></ins></span> a <span 
class="inserted"><ins><em>feature for web sites to track users, which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+  &lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
+    still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+  &lt;li id="M201204280"&gt;
     &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>any file on</strong></del></span> 
<span class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving a valid
-    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;In</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
-      obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>user takes&lt;/a&gt;: starting an app, looking 
at a folder,
-    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>be spied on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>a song.  They send device identifying
+    &lt;p&gt;Xiaomi phones &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
+    visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make
-    users identify themselves</em></ins></span> to <span 
class="removed"><del><strong>use it without having your fingerprints
-      taken. Users would have</strong></del></span> <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
+    other streaming dis-services make a dossier about each user, and &lt;a
+    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
+    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
     &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this</em></ins></span> no <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>matter who does it.&lt;/p&gt;
+    but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>location 
data while in
+  &lt;li id="M201811230"&gt;
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</em></ins></span>
-    even <span class="removed"><del><strong>gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>when &ldquo;location services&rdquo; are turned 
off, even when</em></ins></span>
-    the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold</em></ins></span> with <span class="removed"><del><strong>third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
+  &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the <span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video</strong></del></span> 
<span class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if</em></ins></span> you <span 
class="removed"><del><strong>take,</strong></del></span> <span 
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>keeps them up to date on all your devices.
-      Any edits</strong></del></span> <span class="inserted"><ins><em>location 
tracking,</em></ins></span> you <span class="removed"><del><strong>make are 
automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>must
-    disable Google Play itself to completely stop</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
-    <span class="inserted"><ins><em>yet another example</em></ins></span> of 
<span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to 
break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>nonfree 
software pretending</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>obey</em></ins></span> the <span 
class="inserted"><ins><em>user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
-    transmission</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature</strong></del></span> <span 
class="inserted"><ins><em>substantial expense</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span> <span class="inserted"><ins><em>users.  
Said transmission,
-    not wanted or requested</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;, and they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
     &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us</em></ins></span> by <span 
class="removed"><del><strong>default, though</strong></del></span> <span 
class="inserted"><ins><em>a paywall) reports</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI</em></ins></span> can <span class="removed"><del><strong>be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>remotely activate the GPS</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>microphone in Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  Here 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in</em></ins></span> some <span 
class="inserted"><ins><em>Android devices when they are
+    &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
     by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span class="inserted"><ins><em>voice 
all</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+  &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>personal details of 
users that install</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or it</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>totally 
incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>not enough to
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
     legitimize actions like this.  At this point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, 
instead</em></ins></span> of <span class="removed"><del><strong>iOS 
seem</strong></del></span>
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
-    and</em></ins></span> other <span class="removed"><del><strong>than 
surveillance&lt;/a&gt;.  Here is</strong></del></span> <span 
class="inserted"><ins><em>companies from getting this personal information 
in</em></ins></span> the
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
-      sometimes very clever. Some trackers</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send</em></ins></span> lots of data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even</em></ins></span> which <span 
class="removed"><del><strong>enable them to turn</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1280,16 +1013,14 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
-    for Firefox and Chrome were found</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found to &lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
     snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
-    removed</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>problematic 
extensions</em></ins></span> from <span class="inserted"><ins><em>their stores, 
but this shows
+    removed the problematic extensions from their stores, but this shows
     once more how unsafe nonfree software can be. Tools that are supposed
     to protect a proprietary system are, instead, infecting it with
-    additional malware (the system itself being</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
@@ -1509,7 +1240,7 @@
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
+    Google's policies. But it seems that</em></ins></span> Google <span 
class="removed"><del><strong>redistributes</strong></del></span> <span 
class="inserted"><ins><em>wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
@@ -1533,20 +1264,22 @@
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    haven't yet, but they should also stay away from</em></ins></span> nonfree 
<span class="removed"><del><strong>Android apps, and
+    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> in <span 
class="removed"><del><strong>the responsibility for the 
injustice</strong></del></span>
+    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
+    &lt;p&gt;An investigation</em></ins></span> of <span 
class="inserted"><ins><em>the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    25% fail to protect</em></ins></span> their
+    <span class="removed"><del><strong>being nonfree. It</strong></del></span> 
<span class="inserted"><ins><em>users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
-    found as well.&lt;/p&gt;
+    potentially</em></ins></span> also <span 
class="removed"><del><strong>distributes its own nonfree apps, 
such</strong></del></span> <span class="inserted"><ins><em>be used to spy on 
users. Other technical flaws were
+    found</em></ins></span> as <span class="inserted"><ins><em>well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
@@ -1596,12 +1329,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    &lt;p&gt;Some</em></ins></span> Google
+    <span class="removed"><del><strong>Play,</strong></del></span> <span 
class="inserted"><ins><em>apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>other ways to turn off the other 
kinds</em></ins></span> of <span class="removed"><del><strong>preventing apps 
from
+    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1612,56 +1349,98 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that 
there</em></ins></span> is no <span 
class="removed"><del><strong>systematic</strong></del></span> way <span 
class="removed"><del><strong>for Google, or Android
+    users, to inspect executable proprietary apps</strong></del></span> to 
<span class="removed"><del><strong>see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>save
+    a recording. But we can't be sure from</em></ins></span> the
+    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat 
users</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit</em></ins></span> in
+    <span class="removed"><del><strong>various</strong></del></span>
+    <span class="inserted"><ins><em>many</em></ins></span> ways. <span 
class="removed"><del><strong>If it did a good job</strong></del></span> <span 
class="inserted"><ins><em>This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>this, it could more or less
+    prevent such snooping, except when</strong></del></span> the <span 
class="removed"><del><strong>app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>protect us. 
We must demand release</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these proprietary apps 
whose</em></ins></span>
+    source code <span class="removed"><del><strong>to the
+    public, so we can depend on each other.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy and security
+    of 283 Android VPN</strong></del></span> <span 
class="inserted"><ins><em>they cannot look at.  The other</em></ins></span> 
apps <span class="removed"><del><strong>concluded</strong></del></span> <span 
class="inserted"><ins><em>might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
+    &lt;p&gt;This is evidence</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;in spite of the
+    promises for privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps generally work against
+    their users.  To protect their privacy and freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>may be 
unawarely subject</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>poor security guarantees and abusive practices 
inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is a non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>get rid</em></ins></span> of <span 
class="inserted"><ins><em>the</em></ins></span> proprietary <span 
class="removed"><del><strong>VPN</strong></del></span> <span 
class="inserted"><ins><em>software&mdash;both proprietary
     Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    and the proprietary apps by getting</em></ins></span> apps from the <span 
class="removed"><del><strong>research paper</strong></del></span> <span 
class="inserted"><ins><em>free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
+    which users are HIV-positive, then provides the 
information</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    It could be designed so that</em></ins></span> users <span 
class="removed"><del><strong>and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>communicate such info to each
+    other but not to</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt;</strong></del></span>
 <span class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
+    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to
+      users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN</strong></del></span> <span 
class="inserted"><ins><em>dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>after 
going</em></ins></span> to <span class="removed"><del><strong>read logs
+      for other</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android</em></ins></span> apps
+    <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1671,7 +1450,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.&lt;/p&gt;
+    book</em></ins></span> to <span class="removed"><del><strong>LinkedIn. 
Also, it stores detailed logs</strong></del></span> <span 
class="inserted"><ins><em>developer's server.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
@@ -1681,38 +1460,66 @@
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls</em></ins></span> and <span class="removed"><del><strong>may 
turn</strong></del></span> <span 
class="inserted"><ins><em>sent</em></ins></span> them <span 
class="removed"><del><strong>over</strong></del></span> <span 
class="inserted"><ins><em>and text messages and emails</em></ins></span> to 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the <span class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
+    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>JS 
injection is to display
+      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
+    &lt;p&gt;Could Google</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
-
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app does
+      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A</strong></del></span>
 study
+    <span class="inserted"><ins><em>the source code somehow to determine 
whether they mistreat users</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found that 90%</strong></del></span>
+    <span class="inserted"><ins><em>various ways. If it did a good 
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or 
less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>app developers are 
clever
+    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious</em></ins></span> 
apps, <span class="removed"><del><strong>it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>we cannot 
trust
+    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>source 
code to</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;</em></ins></span>
+    &lt;p&gt;Apps for BART &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop</em></ins></span> on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -1720,60 +1527,110 @@
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears to do lots</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude</strong></del></span> 
<span class="inserted"><ins><em>surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>transmit users'</strong></del></span> personal 
data <span class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in the device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app would record</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of <span 
class="inserted"><ins><em>the audio files</em></ins></span> users <span 
class="removed"><del><strong>is not enough</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span>
+    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting</strong></del></span> this <span 
class="removed"><del><strong>personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> <span class="inserted"><ins><em>was done 
without</em></ins></span> the users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>consent.
+    If</em></ins></span> the <span class="removed"><del><strong>tracking.  
This is
+    yet another example of nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>fine print 
of</em></ins></span> the <span class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a 
thing</strong></del></span> <span class="inserted"><ins><em>app said that users 
gave consent for this,</em></ins></span>
+    would <span class="inserted"><ins><em>that make it acceptable? No way! It 
should</em></ins></span> be <span class="removed"><del><strong>almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span class="removed"><del><strong>the 
most popular</strong></del></span> Android apps <span 
class="inserted"><ins><em>can collude
+    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens</em></ins></span> of <span 
class="removed"><del><strong>their users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon &lt;a
-    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to the app's functionality,
+  was</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
+    on some of its phones.</em></ins></span> The <span 
class="removed"><del><strong>clear way to say
+  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
+    &lt;p&gt;Currently, the app</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    explicitly opt-in before the app</em></ins></span> takes <span 
class="removed"><del><strong>for granted that</strong></del></span> <span 
class="inserted"><ins><em>effect. However,</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span class="inserted"><ins><em>app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is <span class="removed"><del><strong>that valid?  
Software developers have no right</strong></del></span>
+    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  just as wrong</strong></del></span> <span class="inserted"><ins><em>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1782,221 +1639,375 @@
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    consent&rdquo; for surveillance is inadequate</em></ins></span> as <span 
class="removed"><del><strong>any other 
snooping.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
protection against
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201611160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
-    283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
+    283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>concluded that &ldquo;in spite of the promises
+    for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>anonymity given 
by</em></ins></span> the <span class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span> <span 
class="inserted"><ins><em>majority of VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> <span 
class="inserted"><ins><em>poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    &lt;p&gt;Following is</em></ins></span> a
+      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
     of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
+      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>NativeX and Appflood,
+      meant</em></ins></span> to <span class="removed"><del><strong>any file 
on</strong></del></span> <span class="inserted"><ins><em>track users and show 
them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full 
access</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>users'
       text messages.&lt;/dd&gt;
 
-      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      &lt;dt&gt;DroidVPN</em></ins></span> and <span 
class="inserted"><ins><em>TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission 
to read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      &lt;dd&gt;Sends traffic to LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span class="inserted"><ins><em>stores 
detailed logs and
       may turn them over to the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
+      &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In</strong></del></span>
+      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span class="removed"><del><strong>latest iThings 
system, &ldquo;turning off&rdquo; WiFi</strong></del></span> <span 
class="inserted"><ins><em>JS injection is to display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
+      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
+      the
+      <span class="removed"><del><strong>obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of the app</em></ins></span> does 
<span class="removed"><del><strong>turn them off&mdash;only until 5am.
+      That's Apple</strong></del></span> <span 
class="inserted"><ins><em>JavaScript injection</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>tracking the user and displaying 
ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without 
having</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606050"&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    scans</em></ins></span> your <span 
class="removed"><del><strong>fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>mobile phone's photo collections for known 
faces&lt;/a&gt;,
+    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>picture you take according to who</em></ins></span> 
is <span class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span>
+    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>require online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>pictures 
are likely to be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>Facebook's servers</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    even if</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span 
class="inserted"><ins><em>time,</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    it may be analyzing people's conversations to serve them</em></ins></span> 
with <span class="removed"><del><strong>third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201604250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+    spy on many sorts of data in</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span 
class="inserted"><ins><em>phone,</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,
+    it can alter</em></ins></span> them <span class="removed"><del><strong>up 
to date</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>all your devices.
+      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>what radio and TV programs</em></ins></span>
+    are <span class="removed"><del><strong>automatically updated everywhere. 
[...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed</strong></del></span> <span 
class="inserted"><ins><em>playing nearby&lt;/a&gt;.  Also</em></ins></span> on 
<span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>what users post on 
various sites
+    such</em></ins></span> as <span class="removed"><del><strong>a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>Facebook, Google+ 
and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    unrelated</em></ins></span> to <span class="inserted"><ins><em>the app's 
functionality, was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
+    to <span class="removed"><del><strong>get at them,</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
+    legitimate,</em></ins></span> but <span class="removed"><del><strong>NSA 
can access</strong></del></span> <span class="inserted"><ins><em>is that valid? 
Software developers have no right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+    that snoop are just as wrong as</em></ins></span> any <span 
class="inserted"><ins><em>other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;
+    &lt;p&gt;More than 73% and 47%</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+      the</strong></del></span> <span class="inserted"><ins><em>mobile 
applications, for Android and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>location 
information&lt;/a&gt; of their users with
+    third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
     demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that it is nasty.&lt;/p&gt;
+    to realize that</em></ins></span> it is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows the</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways</em></ins></span> that <span class="removed"><del><strong>can 
be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This article shows the &lt;a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    typical example of</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506264"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
-    Android apps contained recognizable tracking libraries. For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;
+    A study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
+    Android apps contained recognizable tracking libraries. 
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>paid
+    proprietary apps,</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+    &ldquo;free&rdquo;, but most</em></ins></span> of <span 
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span 
class="inserted"><ins><em>them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>that 
word</em></ins></span>
+    is <span class="removed"><del><strong>the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="removed"><del><strong>is pervasive and
+      sometimes very clever. Some trackers can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on</em></ins></span> the 
<span class="removed"><del><strong>contact list. This malware is designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>average.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the phones
+      on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>off, listen to the microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+  &lt;li id="M201504060"&gt;
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.</em></ins></span> This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>in addition</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This</em></ins></span> 
is <span class="removed"><del><strong>a
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done by the phone 
company,</em></ins></span> and <span class="removed"><del><strong>they send so 
much data that their transmission is a
       substantial expense for users.  Said transmission, not wanted or
-      requested</strong></del></span> <span class="inserted"><ins><em>in 
addition to
-    the snooping done</em></ins></span> by the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
+      requested</strong></del></span> <span 
class="inserted"><ins><em>perhaps</em></ins></span> by the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>OS in
+    the phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>some
       kind.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone
-      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>OS</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us</strong></del></span>
-    <span class="inserted"><ins><em>the phone.&lt;/p&gt;
-
-    &lt;p&gt;Don't be distracted</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>question of 
whether</em></ins></span> the <span class="removed"><del><strong>GPS and 
microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>app developers
-    get users to say &ldquo;I agree&rdquo;. That</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>no excuse for
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
     malware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</em></ins></span> and 
<span class="removed"><del><strong>users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>optional&lt;/a&gt;. 
Not
+    is doing this</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by</strong></del></span> a 
<span class="removed"><del><strong>paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>at least is 
visible</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The Simeji keyboard</em></ins></span> is <span 
class="inserted"><ins><em>a smartphone version of Baidu's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
     title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
-    &lt;p&gt;The</em></ins></span> nonfree Snapchat app's principal purpose is 
to restrict the
-    use <span class="removed"><del><strong>of</strong></del></span> <span 
class="inserted"><ins><em>of data on the user's computer, but it does 
surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use of data</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>the user's 
computer, but it does surveillance too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</em></ins></span>
+    it <span class="removed"><del><strong>will eventually require all new 
portable phones</strong></del></span> <span 
class="inserted"><ins><em>tries</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>get the user's list of other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2006,12 +2017,9 @@
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal</em></ins></span> data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>user's computer,</strong></del></span> <span 
class="inserted"><ins><em>app developer</em></ins></span> but <span 
class="inserted"><ins><em>did not ask
-    about sending</em></ins></span> it <span class="removed"><del><strong>does 
surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>user's list</strong></del></span> <span 
class="inserted"><ins><em>weakness</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
@@ -2021,71 +2029,93 @@
     
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps</strong></del></span> <span 
class="inserted"><ins><em>say whether it</em></ins></span> can &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>restrict
+      the use of data on the user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>say whether</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do 
so.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That almost certainly means</em></ins></span> it <span 
class="removed"><del><strong>tries to get the user's list of other people's 
phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can do so.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+  &lt;li id="M201307110"&gt;
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note that this article misuses the words
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app and dis-service spy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance</em></ins></span> on <span class="removed"><del><strong>users 
even more than users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> <span 
class="inserted"><ins><em>the game of Minecraft by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring</em></ins></span>
+    every <span class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span> <span 
class="inserted"><ins><em>player to open an account on Microsoft's 
network&lt;/a&gt;. Microsoft
+    has bought the game</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book</strong></del></span> <span class="inserted"><ins><em>will merge 
all accounts into its network,
+    which will give them access</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is</em></ins></span> that 
<span class="removed"><del><strong>this article misuses</strong></del></span> 
<span class="inserted"><ins><em>it is free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>had &lt;a
-    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Facebook's app listens all the time,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude</em></ins></span> 
on <span class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy.&lt;/p&gt;</em></ins></span>
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
@@ -3826,7 +3856,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:02:59 $
+$Date: 2020/11/02 17:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- po/proprietary-surveillance.de.po   2 Nov 2020 15:03:00 -0000       1.350
+++ po/proprietary-surveillance.de.po   2 Nov 2020 17:32:40 -0000       1.351
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -3588,6 +3588,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- po/proprietary-surveillance.es.po   2 Nov 2020 15:03:00 -0000       1.92
+++ po/proprietary-surveillance.es.po   2 Nov 2020 17:32:40 -0000       1.93
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-10-18 11:38+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -3067,6 +3067,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.553
retrieving revision 1.554
diff -u -b -r1.553 -r1.554
--- po/proprietary-surveillance.fr.po   2 Nov 2020 15:22:50 -0000       1.553
+++ po/proprietary-surveillance.fr.po   2 Nov 2020 17:32:40 -0000       1.554
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-11-02 16:21+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3069,6 +3070,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary-surveillance.it-diff.html    2 Nov 2020 15:03:00 -0000       
1.202
+++ po/proprietary-surveillance.it-diff.html    2 Nov 2020 17:32:40 -0000       
1.203
@@ -2323,6 +2323,21 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908210"&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
@@ -3642,7 +3657,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- po/proprietary-surveillance.it.po   2 Nov 2020 15:03:00 -0000       1.362
+++ po/proprietary-surveillance.it.po   2 Nov 2020 17:32:41 -0000       1.363
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -3383,6 +3383,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- po/proprietary-surveillance.ja-diff.html    2 Nov 2020 15:03:00 -0000       
1.220
+++ po/proprietary-surveillance.ja-diff.html    2 Nov 2020 17:32:41 -0000       
1.221
@@ -2099,6 +2099,21 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201908210"&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
@@ -3484,7 +3499,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- po/proprietary-surveillance.ja.po   2 Nov 2020 15:03:00 -0000       1.344
+++ po/proprietary-surveillance.ja.po   2 Nov 2020 17:32:41 -0000       1.345
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -2600,6 +2600,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- po/proprietary-surveillance.pot     2 Nov 2020 15:03:00 -0000       1.283
+++ po/proprietary-surveillance.pot     2 Nov 2020 17:32:41 -0000       1.284
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2079,6 +2079,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\";>requiring
 "
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a "
 
"href=\"https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana\";>
 "
 "human workers listen to the recordings</a>."

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.640
retrieving revision 1.641
diff -u -b -r1.640 -r1.641
--- po/proprietary-surveillance.ru.po   2 Nov 2020 15:03:00 -0000       1.640
+++ po/proprietary-surveillance.ru.po   2 Nov 2020 17:32:42 -0000       1.641
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -3038,6 +3038,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/";
 "article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
 "kinect-cortana\"> human workers listen to the recordings</a>."

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary.de-diff.html 2 Nov 2020 15:03:00 -0000       1.186
+++ po/proprietary.de-diff.html 2 Nov 2020 17:32:42 -0000       1.187
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+  .reduced-width { width: 55em;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -212,6 +212,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -248,15 +263,6 @@
     
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
-    unless they pay a monthly fee.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -320,7 +326,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- po/proprietary.de.po        2 Nov 2020 15:03:00 -0000       1.226
+++ po/proprietary.de.po        2 Nov 2020 17:32:43 -0000       1.227
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -524,15 +541,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- po/proprietary.es.po        2 Nov 2020 15:03:00 -0000       1.333
+++ po/proprietary.es.po        2 Nov 2020 17:32:43 -0000       1.334
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -323,6 +323,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -389,21 +406,6 @@
 "com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"
 "\">utilizar servicios de pago de terceros sin autorización.</a>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-"El aparato de cocción al vacío Mellow está vinculado a un servidor. La "
-"compañía <a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-";
-"unwelcome-subscription-surprise-27630842/\">convirtió de improviso esa "
-"vinculación al servidor en una suscripción</a> que prohíbe a los usuarios "
-"beneficiarse de las «funcionalidades avanzadas» del aparato a menos que "
-"paguen una tarifa mensual."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +487,20 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the &ldquo;"
+#~ "advanced features&rdquo; of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "El aparato de cocción al vacío Mellow está vinculado a un servidor. La "
+#~ "compañía <a 
href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-";
+#~ "unwelcome-subscription-surprise-27630842/\">convirtió de improviso esa "
+#~ "vinculación al servidor en una suscripción</a> que prohíbe a los 
usuarios "
+#~ "beneficiarse de las «funcionalidades avanzadas» del aparato a menos que "
+#~ "paguen una tarifa mensual."
+
+#~ msgid ""
 #~ "Many employers are using nonfree software, including videoconference "
 #~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 #~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.376
retrieving revision 1.377
diff -u -b -r1.376 -r1.377
--- po/proprietary.fr.po        2 Nov 2020 15:22:50 -0000       1.376
+++ po/proprietary.fr.po        2 Nov 2020 17:32:43 -0000       1.377
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-11-02 16:21+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -315,6 +316,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -390,20 +408,6 @@
 "money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"
 "\">utiliser des services tiers de paiement sans autorisation</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-"L'appareil de cuisson sous vide Mellow est couplé à un serveur. Cette "
-"société a soudainement <a 
href=\"https://www.slashgear.com/mellow-sous-vide-";
-"owners-get-unwelcome-subscription-surprise-27630842/\">transformé ce simple "
-"ancrage en un abonnement</a> qui interdit aux utilisateurs de profiter des "
-"« fonctionnalités avancées » à moins de payer une cotisation 
mensuelle."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -478,6 +482,20 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the &ldquo;"
+#~ "advanced features&rdquo; of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "L'appareil de cuisson sous vide Mellow est couplé à un serveur. Cette "
+#~ "société a soudainement <a href=\"https://www.slashgear.com/mellow-sous-";
+#~ "vide-owners-get-unwelcome-subscription-surprise-27630842/\">transformé ce 
"
+#~ "simple ancrage en un abonnement</a> qui interdit aux utilisateurs de "
+#~ "profiter des « fonctionnalités avancées » à moins de payer une 
cotisation "
+#~ "mensuelle."
+
+#~ msgid ""
 #~ "Many employers are using nonfree software, including videoconference "
 #~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 #~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- po/proprietary.it-diff.html 2 Nov 2020 15:03:00 -0000       1.198
+++ po/proprietary.it-diff.html 2 Nov 2020 17:32:43 -0000       1.199
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+  .reduced-width { width: 55em;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -125,19 +125,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -247,15 +262,6 @@
     
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
-    unless they pay a monthly fee.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -319,7 +325,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- po/proprietary.it.po        2 Nov 2020 15:03:00 -0000       1.235
+++ po/proprietary.it.po        2 Nov 2020 17:32:43 -0000       1.236
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -517,15 +534,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- po/proprietary.ja-diff.html 2 Nov 2020 15:03:00 -0000       1.203
+++ po/proprietary.ja-diff.html 2 Nov 2020 17:32:43 -0000       1.204
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -158,15 +158,15 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -210,6 +210,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -246,15 +261,6 @@
     
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
-    unless they pay a monthly fee.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -318,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary.ja.po        2 Nov 2020 15:03:00 -0000       1.219
+++ po/proprietary.ja.po        2 Nov 2020 17:32:45 -0000       1.220
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -375,15 +392,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- po/proprietary.nl-diff.html 2 Nov 2020 15:03:00 -0000       1.199
+++ po/proprietary.nl-diff.html 2 Nov 2020 17:32:45 -0000       1.200
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+  .reduced-width { width: 55em;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -211,6 +211,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -247,15 +262,6 @@
     
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
-    unless they pay a monthly fee.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -319,7 +325,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- po/proprietary.nl.po        2 Nov 2020 15:03:00 -0000       1.209
+++ po/proprietary.nl.po        2 Nov 2020 17:32:45 -0000       1.210
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -420,15 +437,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/proprietary.pl-diff.html 2 Nov 2020 15:03:00 -0000       1.216
+++ po/proprietary.pl-diff.html 2 Nov 2020 17:32:45 -0000       1.217
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -55,14 +55,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -114,8 +114,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>September, 2020, the pages in this directory 
list around 450
-instances of malicious functionalities (with more than 540 references to
+&lt;p&gt;As of September, 2020, the pages in this directory list around 450
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 540 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -156,17 +156,17 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -210,6 +210,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -246,15 +261,6 @@
     
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
-    unless they pay a monthly fee.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -318,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary.pl.po        2 Nov 2020 15:03:00 -0000       1.202
+++ po/proprietary.pl.po        2 Nov 2020 17:32:45 -0000       1.203
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -601,15 +618,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- po/proprietary.pot  2 Nov 2020 15:03:00 -0000       1.199
+++ po/proprietary.pot  2 Nov 2020 17:32:45 -0000       1.200
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\";>requiring
 "
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a "
 
"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
 "users to create an account on their network</a> to be able to install and "
@@ -309,15 +326,6 @@
 "utilizing third-party payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/\";>
 "
-"turned this tethering into a subscription</a>, forbidding users from taking "
-"advantage of the &ldquo;advanced features&rdquo; of the cooker unless they "
-"pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary.pt-br-diff.html      2 Nov 2020 15:03:00 -0000       1.8
+++ po/proprietary.pt-br-diff.html      2 Nov 2020 17:32:45 -0000       1.9
@@ -187,13 +187,25 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li <span class="removed"><del><strong>id="M202007010"&gt;
-    &lt;p&gt;BMW will remotely &lt;a
-    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
-    enable and disable functionality in cars&lt;/a&gt; through a universal
-    back door.&lt;/p&gt;
+    &lt;p&gt;BMW will remotely</strong></del></span> <span 
class="inserted"><ins><em>id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game</em></ins></span> and <span 
class="removed"><del><strong>disable functionality in cars&lt;/a&gt; 
through</strong></del></span> <span class="inserted"><ins><em>will merge all 
accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a <span class="removed"><del><strong>universal
+    back door.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>bonus,
+    it offers more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202006300"&gt;
+  &lt;li <span class="removed"><del><strong>id="M202006300"&gt;
     &lt;p&gt;&ldquo;Bossware&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>id="M201912160"&gt;
     &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>malware that bosses</strong></del></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
@@ -204,22 +216,22 @@
 
     &lt;p&gt;This shows why requiring</strong></del></span> <span 
class="inserted"><ins><em>their network&lt;/a&gt; to be able to install
     and use</em></ins></span> the <span class="removed"><del><strong>user's 
&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is 
<span class="removed"><del><strong>not
-    an adequate basis for protecting digital privacy.</strong></del></span> 
<span class="inserted"><ins><em>malware.</em></ins></span> The <span 
class="removed"><del><strong>boss</strong></del></span> <span 
class="inserted"><ins><em>account</em></ins></span> can <span 
class="removed"><del><strong>coerce
+    an adequate basis for protecting digital privacy.</strong></del></span> 
<span class="inserted"><ins><em>malware.</em></ins></span> The <span 
class="removed"><del><strong>boss can coerce
     most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should</strong></del></span>
-    be <span class="removed"><del><strong>prosecuted</strong></del></span> 
<span class="inserted"><ins><em>used</em></ins></span> for <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance and/or violating people's rights in many 
ways,
+    to contagious disease that</strong></del></span> <span 
class="inserted"><ins><em>account</em></ins></span> can
+    be <span class="removed"><del><strong>fatal.  Software like this should
+    be illegal and bosses that demand it should be 
prosecuted</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> for <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance and/or violating people's rights in many 
ways,
     such as turning their purchased software to a subscription 
product.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>id="M202010220"&gt;
-    &lt;p&gt;The</em></ins></span> addictive <span 
class="removed"><del><strong>features&lt;/a&gt; derived 
from</strong></del></span> <span class="inserted"><ins><em>Genshin Impact 
relentlessly</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    &lt;p&gt;The</em></ins></span> addictive <span 
class="removed"><del><strong>features&lt;/a&gt; derived from &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
     behavioral manipulation techniques&lt;/a&gt;. Certain
-    repetitive aspects of the game, like &lt;a
-    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
+    repetitive aspects of the game, like</strong></del></span> <span 
class="inserted"><ins><em>Genshin Impact relentlessly</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
     grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
     thus encourage children and impressionable people</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
@@ -256,19 +268,11 @@
     &lt;p&gt;Roblox (among many other games)
     created anti-features which sucker children into</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. 
This</strong></del></span>
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
-    utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker</em></ins></span> is <span 
class="removed"><del><strong>illegal due</strong></del></span>
-    <span class="inserted"><ins><em>tethered</em></ins></span> to <span 
class="inserted"><ins><em>a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of</em></ins></span> the <span 
class="removed"><del><strong>Video Privacy Protection Act</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;advanced 
features&rdquo;</em></ins></span> of <span class="removed"><del><strong>1988, 
but they're circumventing
-    it through EULAs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the cooker
-    unless they pay a monthly fee.&lt;/p&gt;</em></ins></span>
+    utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -332,7 +336,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/proprietary.pt-br.po     2 Nov 2020 15:03:00 -0000       1.334
+++ po/proprietary.pt-br.po     2 Nov 2020 17:32:45 -0000       1.335
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -318,6 +318,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -371,15 +388,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.411
retrieving revision 1.412
diff -u -b -r1.411 -r1.412
--- po/proprietary.ru.po        2 Nov 2020 15:03:00 -0000       1.411
+++ po/proprietary.ru.po        2 Nov 2020 17:32:45 -0000       1.412
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -319,6 +319,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -386,20 +403,6 @@
 "spent-600-on-their-ipads-without-my-knowledge\"> пользованию 
службами оплаты "
 "третьих сторон без проверки 
подлинности</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-"Оборудование для су-вида Mellow привязано к 
серверу. Компания неожиданно <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> обратило эту привязку 
в подписку</a>, "
-"запретив пользователям применять 
&ldquo;прогрессивные функции&rdquo; "
-"оборудования, если те не вносят 
ежемесячную плату."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -476,6 +479,19 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the &ldquo;"
+#~ "advanced features&rdquo; of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "Оборудование для су-вида Mellow привязано к 
серверу. Компания неожиданно "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> обратило эту 
привязку в подписку</a>, "
+#~ "запретив пользователям применять 
&ldquo;прогрессивные функции&rdquo; "
+#~ "оборудования, если те не вносят 
ежемесячную плату."
+
+#~ msgid ""
 #~ "Many employers are using nonfree software, including videoconference "
 #~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 #~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"

Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/proprietary.tr.po        2 Nov 2020 16:23:07 -0000       1.69
+++ po/proprietary.tr.po        2 Nov 2020 17:32:45 -0000       1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-11-02 17:18+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.1\n"
 
@@ -313,6 +314,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -386,20 +404,6 @@
 "my-knowledge\"> yetkilendirme olmadan üçüncü taraf ödeme hizmetlerini "
 "kullanmak üzere</a> aldatan anti-özellikler oluşturdu."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-"Mellow sous-vide pişirici bir sunucuya bağlıdır. Şirket birdenbire <a 
href="
-"\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> bu yuları bir aboneliğe çevirdi</a>, "
-"aylık bir ücret ödemedikleri takdirde kullanıcıların pişiricinin 
&ldquo;"
-"gelişmiş özelliklerinden&rdquo; yararlanmalarını yasaklıyor."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +485,19 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the &ldquo;"
+#~ "advanced features&rdquo; of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "Mellow sous-vide pişirici bir sunucuya bağlıdır. Şirket birdenbire <a 
"
+#~ "href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> bu yuları bir aboneliğe çevirdi</a>, 
"
+#~ "aylık bir ücret ödemedikleri takdirde kullanıcıların pişiricinin 
&ldquo;"
+#~ "gelişmiş özelliklerinden&rdquo; yararlanmalarını yasaklıyor."
+
+#~ msgid ""
 #~ "Many employers are using nonfree software, including videoconference "
 #~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 #~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"

Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary.zh-cn.po     2 Nov 2020 15:03:01 -0000       1.74
+++ po/proprietary.zh-cn.po     2 Nov 2020 17:32:45 -0000       1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-10-19 11:31+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -296,6 +296,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -353,19 +370,6 @@
 "theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-"
 "my-knowledge\">使用无需授权的第三方支付功能。</a>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-"Mellow sous-vide 电饭煲器绑定了一个服务器。该公司突然 <a 
href=\"https://www.";
-"slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-"
-"surprise-27630842/\">把绑定改为注册</a>,如果用户不付月租费,那么他们就不能使"
-"用电饭煲的某些 &ldquo;高级功能&rdquo;。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -450,6 +454,18 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the &ldquo;"
+#~ "advanced features&rdquo; of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "Mellow sous-vide 电饭煲器绑定了一个服务器。该公司突然 <a 
href=\"https://";
+#~ "www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-"
+#~ 
"surprise-27630842/\">把绑定改为注册</a>,如果用户不付月租费,那么他们就不"
+#~ "能使用电饭煲的某些 &ldquo;高级功能&rdquo;。"
+
+#~ msgid ""
 #~ "Many employers are using nonfree software, including videoconference "
 #~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/";
 #~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- po/proprietary.zh-tw-diff.html      2 Nov 2020 15:03:01 -0000       1.179
+++ po/proprietary.zh-tw-diff.html      2 Nov 2020 17:32:45 -0000       1.180
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+  .reduced-width { width: 55em;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -212,6 +212,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;p&gt;Microsoft is &lt;a
     
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
@@ -248,15 +263,6 @@
     
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
     utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202007270"&gt;
-    &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly &lt;a
-    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
-    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
-    unless they pay a monthly fee.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -320,7 +326,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 15:03:01 $
+$Date: 2020/11/02 17:32:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- po/proprietary.zh-tw.po     2 Nov 2020 15:03:01 -0000       1.189
+++ po/proprietary.zh-tw.po     2 Nov 2020 17:32:45 -0000       1.190
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "
@@ -490,15 +507,6 @@
 "payment services without authorization.</a>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-";
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the &ldquo;"
-"advanced features&rdquo; of the cooker unless they pay a monthly fee."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- po/pt-br.po 2 Nov 2020 15:03:01 -0000       1.288
+++ po/pt-br.po 2 Nov 2020 17:32:45 -0000       1.289
@@ -3529,6 +3529,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.491
retrieving revision 1.492
diff -u -b -r1.491 -r1.492
--- po/ru.po    2 Nov 2020 15:03:01 -0000       1.491
+++ po/ru.po    2 Nov 2020 17:32:45 -0000       1.492
@@ -4316,6 +4316,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/tr.po    2 Nov 2020 16:30:57 -0000       1.69
+++ po/tr.po    2 Nov 2020 17:32:45 -0000       1.70
@@ -3121,6 +3121,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/zh-cn.po 2 Nov 2020 15:03:01 -0000       1.64
+++ po/zh-cn.po 2 Nov 2020 17:32:45 -0000       1.65
@@ -3106,6 +3106,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/zh-tw.po 2 Nov 2020 15:03:01 -0000       1.224
+++ po/zh-tw.po 2 Nov 2020 17:32:45 -0000       1.225
@@ -3137,6 +3137,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-";
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian.";
 "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
 "\">coerces players to spend money by overwhelming the game play with loot "

Index: po/malware-in-online-conferencing.pot
===================================================================
RCS file: po/malware-in-online-conferencing.pot
diff -N po/malware-in-online-conferencing.pot
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-in-online-conferencing.pot       2 Nov 2020 17:32:38 -0000       
1.1
@@ -0,0 +1,139 @@
+# LANGUAGE translation of 
https://www.gnu.org/proprietary/malware-in-online-conferencing.html
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the original article.
+# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: malware-in-online-conferencing.html\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
+"Language-Team: LANGUAGE <LL@li.org>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: Content of: <title>
+msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
+msgstr ""
+
+#. type: Content of: <div><a>
+msgid "<a id=\"side-menu-button\" class=\"switch\" href=\"#navlinks\">"
+msgstr ""
+
+#. type: Attribute 'title' of: <div><a><img>
+msgid "Section contents"
+msgstr ""
+
+#. type: Attribute 'alt' of: <div><a><img>
+msgid "&nbsp;[Section contents]&nbsp;"
+msgstr ""
+
+#. type: Content of: <div>
+msgid "</a>"
+msgstr ""
+
+#. type: Content of: <div><p><a>
+msgid "<a href=\"/\">"
+msgstr ""
+
+#. type: Attribute 'title' of: <div><p><a><img>
+msgid "GNU Home"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"</a>&nbsp;/ <a href=\"/proprietary/proprietary.html\">Malware</a>&nbsp;/ By "
+"product&nbsp;/"
+msgstr ""
+
+#. type: Content of: <div><h2>
+msgid "Malware in Online Conferencing"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Nonfree (proprietary) software is very often malware (designed to mistreat "
+"the user). Nonfree software is controlled by its developers, which puts them "
+"in a position of power over the users; <a "
+"href=\"/philosophy/free-software-even-more-important.html\">that is the "
+"basic injustice</a>. The developers and manufacturers often exercise that "
+"power to the detriment of the users they ought to serve."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><div><p>
+msgid ""
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a "
+"href=\"mailto:webmasters@gnu.org\";>&lt;webmasters@gnu.org&gt;</a> to inform "
+"us. Please include the URL of a trustworthy reference or two to serve as "
+"specific substantiation."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid "First item"
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Please send general FSF &amp; GNU inquiries to <a "
+"href=\"mailto:gnu@gnu.org\";>&lt;gnu@gnu.org&gt;</a>.  There are also <a "
+"href=\"/contact/\">other ways to contact</a> the FSF.  Broken links and "
+"other corrections or suggestions can be sent to <a "
+"href=\"mailto:webmasters@gnu.org\";>&lt;webmasters@gnu.org&gt;</a>."
+msgstr ""
+
+#.  TRANSLATORS: Ignore the original text in this paragraph,
+#.         replace it with the translation of these two:
+#
+#.         We work hard and do our best to provide accurate, good quality
+#.         translations.  However, we are not exempt from imperfection.
+#.         Please send your comments and general suggestions in this regard
+#.         to <a href="mailto:web-translators@gnu.org";>
+#
+#.         &lt;web-translators@gnu.org&gt;</a>.</p>
+#
+#.         <p>For information on coordinating and contributing translations of
+#.         our web pages, see <a
+#.         href="/server/standards/README.translations.html">Translations
+#.         README</a>. 
+#. type: Content of: <div><div><p>
+msgid ""
+"Please see the <a "
+"href=\"/server/standards/README.translations.html\">Translations README</a> "
+"for information on coordinating and contributing translations of this "
+"article."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2020 Free Software Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"This page is licensed under a <a rel=\"license\" "
+"href=\"http://creativecommons.org/licenses/by/4.0/\";>Creative Commons "
+"Attribution 4.0 International License</a>."
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr ""
+
+#.  timestamp start 
+#. type: Content of: <div><p>
+msgid "Updated:"
+msgstr ""

Index: po/malware-in-online-conferencing.translist
===================================================================
RCS file: po/malware-in-online-conferencing.translist
diff -N po/malware-in-online-conferencing.translist
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-in-online-conferencing.translist 2 Nov 2020 17:32:38 -0000       
1.1
@@ -0,0 +1,10 @@
+<!-- begin translist file -->
+<!--#set var="TRANSLATION_LIST"
+value='<div id="translations">
+<p>
+<span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/malware-in-online-conferencing.en.html">English</a> 
&nbsp;</span>
+</p>
+</div>' -->
+<link rel="alternate" type="text/html" 
href="/proprietary/malware-in-online-conferencing.html" hreflang="x-default" />
+<link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/malware-in-online-conferencing.en.html" title="English" />
+<!-- end translist file -->



reply via email to

[Prev in Thread] Current Thread [Next in Thread]