www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www education/edu-cases-argentina-ecen.de.html ...


From: GNUN
Subject: www education/edu-cases-argentina-ecen.de.html ...
Date: Tue, 10 Nov 2020 12:37:49 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/10 12:37:45

Modified files:
        education      : edu-cases-argentina-ecen.de.html 
                         edu-cases-argentina-ecen.el.html 
                         edu-cases-argentina-ecen.es.html 
                         edu-cases-argentina-ecen.fr.html 
                         edu-cases-argentina-ecen.hr.html 
                         edu-cases-argentina-ecen.it.html 
                         edu-cases-argentina-ecen.ja.html 
                         edu-cases-argentina-ecen.lt.html 
                         edu-cases-argentina-ecen.pt-br.html 
                         edu-cases-argentina-ecen.ru.html 
                         edu-cases-argentina-ecen.tr.html 
                         edu-cases-argentina-ecen.uk.html 
                         edu-cases-argentina-ecen.zh-cn.html 
                         edu-cases-india-ambedkar.ar.html 
                         edu-cases-india-ambedkar.de.html 
                         edu-cases-india-ambedkar.el.html 
                         edu-cases-india-ambedkar.es.html 
                         edu-cases-india-ambedkar.fr.html 
                         edu-cases-india-ambedkar.hr.html 
                         edu-cases-india-ambedkar.it.html 
                         edu-cases-india-ambedkar.ja.html 
                         edu-cases-india-ambedkar.lt.html 
                         edu-cases-india-ambedkar.pt-br.html 
                         edu-cases-india-ambedkar.ru.html 
                         edu-cases-india-ambedkar.tr.html 
                         edu-cases-india-ambedkar.uk.html 
                         edu-cases-india-ambedkar.zh-cn.html 
                         edu-cases-india-irimpanam.de.html 
                         edu-cases-india-irimpanam.el.html 
                         edu-cases-india-irimpanam.es.html 
                         edu-cases-india-irimpanam.fr.html 
                         edu-cases-india-irimpanam.hr.html 
                         edu-cases-india-irimpanam.it.html 
                         edu-cases-india-irimpanam.ja.html 
                         edu-cases-india-irimpanam.ko.html 
                         edu-cases-india-irimpanam.lt.html 
                         edu-cases-india-irimpanam.ml.html 
                         edu-cases-india-irimpanam.nl.html 
                         edu-cases-india-irimpanam.pl.html 
                         edu-cases-india-irimpanam.pt-br.html 
                         edu-cases-india-irimpanam.ru.html 
                         edu-cases-india-irimpanam.tr.html 
                         edu-cases-india-irimpanam.uk.html 
                         edu-cases-india-irimpanam.zh-cn.html 
                         edu-schools.ar.html edu-schools.ca.html 
                         edu-schools.de.html edu-schools.es.html 
                         edu-schools.fr.html edu-schools.it.html 
                         edu-schools.ja.html edu-schools.lt.html 
                         edu-schools.ml.html edu-schools.nl.html 
                         edu-schools.pl.html edu-schools.pt-br.html 
                         edu-schools.ru.html edu-schools.sq.html 
                         edu-schools.tr.html edu-schools.uk.html 
                         edu-schools.zh-cn.html 
                         edu-software-gimp.es.html 
                         edu-software-gimp.fr.html 
                         edu-software-gimp.hr.html 
                         edu-software-gimp.it.html 
                         edu-software-gimp.ja.html 
                         edu-software-gimp.pt-br.html 
                         edu-software-gimp.tr.html 
                         edu-software-gimp.uk.html 
                         edu-software-gimp.zh-cn.html 
                         
remote-education-children-freedom-privacy-at-stake.es.html 
                         
remote-education-children-freedom-privacy-at-stake.fr.html 
                         
remote-education-children-freedom-privacy-at-stake.tr.html 
                         
remote-education-children-freedom-privacy-at-stake.zh-cn.html 
        education/po   : edu-cases-argentina-ecen.de-en.html 
                         edu-cases-argentina-ecen.de.po 
                         edu-cases-argentina-ecen.el-en.html 
                         edu-cases-argentina-ecen.el.po 
                         edu-cases-argentina-ecen.es-en.html 
                         edu-cases-argentina-ecen.es.po 
                         edu-cases-argentina-ecen.fr-en.html 
                         edu-cases-argentina-ecen.fr.po 
                         edu-cases-argentina-ecen.hr-en.html 
                         edu-cases-argentina-ecen.hr.po 
                         edu-cases-argentina-ecen.it-en.html 
                         edu-cases-argentina-ecen.it.po 
                         edu-cases-argentina-ecen.ja-en.html 
                         edu-cases-argentina-ecen.ja.po 
                         edu-cases-argentina-ecen.lt-en.html 
                         edu-cases-argentina-ecen.lt.po 
                         edu-cases-argentina-ecen.pot 
                         edu-cases-argentina-ecen.pt-br-en.html 
                         edu-cases-argentina-ecen.pt-br.po 
                         edu-cases-argentina-ecen.ru-en.html 
                         edu-cases-argentina-ecen.ru.po 
                         edu-cases-argentina-ecen.tr-en.html 
                         edu-cases-argentina-ecen.tr.po 
                         edu-cases-argentina-ecen.uk-en.html 
                         edu-cases-argentina-ecen.uk.po 
                         edu-cases-argentina-ecen.zh-cn-en.html 
                         edu-cases-argentina-ecen.zh-cn.po 
                         edu-cases-india-ambedkar.ar-en.html 
                         edu-cases-india-ambedkar.ar.po 
                         edu-cases-india-ambedkar.de-en.html 
                         edu-cases-india-ambedkar.de.po 
                         edu-cases-india-ambedkar.el-en.html 
                         edu-cases-india-ambedkar.el.po 
                         edu-cases-india-ambedkar.es-en.html 
                         edu-cases-india-ambedkar.es.po 
                         edu-cases-india-ambedkar.fr-en.html 
                         edu-cases-india-ambedkar.fr.po 
                         edu-cases-india-ambedkar.hr-en.html 
                         edu-cases-india-ambedkar.hr.po 
                         edu-cases-india-ambedkar.it-en.html 
                         edu-cases-india-ambedkar.it.po 
                         edu-cases-india-ambedkar.ja-en.html 
                         edu-cases-india-ambedkar.ja.po 
                         edu-cases-india-ambedkar.lt-en.html 
                         edu-cases-india-ambedkar.lt.po 
                         edu-cases-india-ambedkar.pot 
                         edu-cases-india-ambedkar.pt-br-en.html 
                         edu-cases-india-ambedkar.pt-br.po 
                         edu-cases-india-ambedkar.ru-en.html 
                         edu-cases-india-ambedkar.ru.po 
                         edu-cases-india-ambedkar.tr-en.html 
                         edu-cases-india-ambedkar.tr.po 
                         edu-cases-india-ambedkar.uk-en.html 
                         edu-cases-india-ambedkar.uk.po 
                         edu-cases-india-ambedkar.zh-cn-en.html 
                         edu-cases-india-ambedkar.zh-cn.po 
                         edu-cases-india-irimpanam.de-en.html 
                         edu-cases-india-irimpanam.de.po 
                         edu-cases-india-irimpanam.el-en.html 
                         edu-cases-india-irimpanam.el.po 
                         edu-cases-india-irimpanam.es-en.html 
                         edu-cases-india-irimpanam.es.po 
                         edu-cases-india-irimpanam.fr-en.html 
                         edu-cases-india-irimpanam.fr.po 
                         edu-cases-india-irimpanam.hr-en.html 
                         edu-cases-india-irimpanam.hr.po 
                         edu-cases-india-irimpanam.it-en.html 
                         edu-cases-india-irimpanam.it.po 
                         edu-cases-india-irimpanam.ja-en.html 
                         edu-cases-india-irimpanam.ja.po 
                         edu-cases-india-irimpanam.ko-en.html 
                         edu-cases-india-irimpanam.ko.po 
                         edu-cases-india-irimpanam.lt-en.html 
                         edu-cases-india-irimpanam.lt.po 
                         edu-cases-india-irimpanam.ml-en.html 
                         edu-cases-india-irimpanam.ml.po 
                         edu-cases-india-irimpanam.nl-en.html 
                         edu-cases-india-irimpanam.nl.po 
                         edu-cases-india-irimpanam.pl-en.html 
                         edu-cases-india-irimpanam.pl.po 
                         edu-cases-india-irimpanam.pot 
                         edu-cases-india-irimpanam.pt-br-en.html 
                         edu-cases-india-irimpanam.pt-br.po 
                         edu-cases-india-irimpanam.ru-en.html 
                         edu-cases-india-irimpanam.ru.po 
                         edu-cases-india-irimpanam.tr-en.html 
                         edu-cases-india-irimpanam.tr.po 
                         edu-cases-india-irimpanam.uk-en.html 
                         edu-cases-india-irimpanam.uk.po 
                         edu-cases-india-irimpanam.zh-cn-en.html 
                         edu-cases-india-irimpanam.zh-cn.po 
                         edu-schools.ar-en.html edu-schools.ar.po 
                         edu-schools.ca-en.html edu-schools.ca.po 
                         edu-schools.de-en.html edu-schools.de.po 
                         edu-schools.el-diff.html edu-schools.el.po 
                         edu-schools.es-en.html edu-schools.es.po 
                         edu-schools.fr-en.html edu-schools.fr.po 
                         edu-schools.hr-diff.html edu-schools.hr.po 
                         edu-schools.it-en.html edu-schools.it.po 
                         edu-schools.ja-en.html edu-schools.ja.po 
                         edu-schools.lt-en.html edu-schools.lt.po 
                         edu-schools.ml-en.html edu-schools.ml.po 
                         edu-schools.nl-en.html edu-schools.nl.po 
                         edu-schools.pl-en.html edu-schools.pl.po 
                         edu-schools.pot edu-schools.pt-br-en.html 
                         edu-schools.pt-br.po edu-schools.ru-en.html 
                         edu-schools.ru.po edu-schools.sq-en.html 
                         edu-schools.sq.po edu-schools.tr-en.html 
                         edu-schools.tr.po edu-schools.uk-en.html 
                         edu-schools.uk.po edu-schools.zh-cn-en.html 
                         edu-schools.zh-cn.po 
                         edu-software-gimp.es-en.html 
                         edu-software-gimp.fr-en.html 
                         edu-software-gimp.hr-en.html 
                         edu-software-gimp.it-en.html 
                         edu-software-gimp.ja-en.html 
                         edu-software-gimp.pt-br-en.html 
                         edu-software-gimp.tr-en.html 
                         edu-software-gimp.uk-en.html 
                         edu-software-gimp.zh-cn-en.html 
                         
remote-education-children-freedom-privacy-at-stake.es-en.html 
                         
remote-education-children-freedom-privacy-at-stake.es.po 
                         
remote-education-children-freedom-privacy-at-stake.fr-en.html 
                         
remote-education-children-freedom-privacy-at-stake.fr.po 
                         remote-education-children-freedom-privacy-at-stake.pot 
                         
remote-education-children-freedom-privacy-at-stake.tr-en.html 
                         
remote-education-children-freedom-privacy-at-stake.tr.po 
                         
remote-education-children-freedom-privacy-at-stake.zh-cn-en.html 
                         
remote-education-children-freedom-privacy-at-stake.zh-cn.po 
        philosophy     : saying-no-even-once.es.html 
                         saying-no-even-once.fr.html 
                         saying-no-even-once.tr.html 
                         saying-no-even-once.zh-cn.html 
                         self-interest.fr.html self-interest.ru.html 
                         self-interest.zh-cn.html 
                         self-interest.zh-tw.html 
        philosophy/po  : saying-no-even-once.es-en.html 
                         saying-no-even-once.es.po 
                         saying-no-even-once.fr-en.html 
                         saying-no-even-once.fr.po 
                         saying-no-even-once.pot 
                         saying-no-even-once.tr-en.html 
                         saying-no-even-once.tr.po 
                         saying-no-even-once.zh-cn-en.html 
                         saying-no-even-once.zh-cn.po 
                         self-interest.fr-en.html 
                         self-interest.ru-en.html 
                         self-interest.zh-cn-en.html 
                         self-interest.zh-tw-en.html 
        proprietary    : malware-games.es.html malware-games.fr.html 
                         malware-games.ru.html malware-mobiles.es.html 
                         malware-mobiles.fr.html malware-mobiles.ru.html 
                         malware-webpages.es.html 
                         malware-webpages.fr.html 
                         malware-webpages.ru.html 
                         potential-malware.es.html 
                         potential-malware.fr.html 
                         potential-malware.ru.html 
                         proprietary-addictions.es.html 
                         proprietary-addictions.fr.html 
                         proprietary-addictions.ru.html 
                         proprietary-addictions.tr.html 
                         proprietary-back-doors.es.html 
                         proprietary-back-doors.fr.html 
                         proprietary-back-doors.ru.html 
                         proprietary-censorship.ru.html 
                         proprietary-coverups.es.html 
                         proprietary-coverups.fr.html 
                         proprietary-coverups.ru.html 
                         proprietary-deception.es.html 
                         proprietary-deception.fr.html 
                         proprietary-deception.ru.html 
                         proprietary-drm.es.html proprietary-drm.fr.html 
                         proprietary-drm.ru.html 
                         proprietary-fraud.es.html 
                         proprietary-fraud.fr.html 
                         proprietary-fraud.ru.html 
                         proprietary-incompatibility.es.html 
                         proprietary-incompatibility.fr.html 
                         proprietary-incompatibility.ru.html 
                         proprietary-insecurity.es.html 
                         proprietary-insecurity.fr.html 
                         proprietary-insecurity.ru.html 
                         proprietary-interference.es.html 
                         proprietary-interference.fr.html 
                         proprietary-interference.ru.html 
                         proprietary-jails.es.html 
                         proprietary-jails.fr.html 
                         proprietary-jails.ru.html 
                         proprietary-manipulation.es.html 
                         proprietary-manipulation.fr.html 
                         proprietary-manipulation.ru.html 
                         proprietary-obsolescence.es.html 
                         proprietary-obsolescence.fr.html 
                         proprietary-obsolescence.ru.html 
                         proprietary-sabotage.es.html 
                         proprietary-sabotage.fr.html 
                         proprietary-sabotage.ru.html 
                         proprietary-subscriptions.es.html 
                         proprietary-subscriptions.fr.html 
                         proprietary-subscriptions.ru.html 
                         proprietary-surveillance.es.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.ru.html 
                         proprietary-tethers.es.html 
                         proprietary-tethers.fr.html 
                         proprietary-tethers.ru.html 
                         proprietary-tyrants.es.html 
                         proprietary-tyrants.fr.html 
                         proprietary-tyrants.pt-br.html 
                         proprietary-tyrants.ru.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-games.de-diff.html malware-games.de.po 
                         malware-games.es-en.html malware-games.es.po 
                         malware-games.fr-en.html malware-games.fr.po 
                         malware-games.ja-diff.html malware-games.ja.po 
                         malware-games.pot malware-games.ru-en.html 
                         malware-games.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po 
                         malware-mobiles.es-en.html 
                         malware-mobiles.es.po 
                         malware-mobiles.fr-en.html 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru-en.html 
                         malware-mobiles.ru.po 
                         malware-webpages.de-diff.html 
                         malware-webpages.de.po 
                         malware-webpages.es-en.html 
                         malware-webpages.es.po 
                         malware-webpages.fr-en.html 
                         malware-webpages.fr.po malware-webpages.pot 
                         malware-webpages.ru-en.html 
                         malware-webpages.ru.po nl.po pl.po pot 
                         potential-malware.de-diff.html 
                         potential-malware.de.po 
                         potential-malware.es-en.html 
                         potential-malware.es.po 
                         potential-malware.fr-en.html 
                         potential-malware.fr.po potential-malware.pot 
                         potential-malware.ru-en.html 
                         potential-malware.ru.po 
                         proprietary-addictions.es-en.html 
                         proprietary-addictions.es.po 
                         proprietary-addictions.fr-en.html 
                         proprietary-addictions.fr.po 
                         proprietary-addictions.pot 
                         proprietary-addictions.ru-en.html 
                         proprietary-addictions.ru.po 
                         proprietary-addictions.tr-en.html 
                         proprietary-addictions.tr.po 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es-en.html 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr-en.html 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru-en.html 
                         proprietary-back-doors.ru.po 
                         proprietary-censorship.de-diff.html 
                         proprietary-censorship.de.po 
                         proprietary-censorship.es.po 
                         proprietary-censorship.fr.po 
                         proprietary-censorship.it-diff.html 
                         proprietary-censorship.it.po 
                         proprietary-censorship.ja-diff.html 
                         proprietary-censorship.ja.po 
                         proprietary-censorship.pot 
                         proprietary-censorship.ru-en.html 
                         proprietary-censorship.ru.po 
                         proprietary-coverups.de-diff.html 
                         proprietary-coverups.de.po 
                         proprietary-coverups.es-en.html 
                         proprietary-coverups.es.po 
                         proprietary-coverups.fr-en.html 
                         proprietary-coverups.fr.po 
                         proprietary-coverups.ja-diff.html 
                         proprietary-coverups.ja.po 
                         proprietary-coverups.pot 
                         proprietary-coverups.ru-en.html 
                         proprietary-coverups.ru.po 
                         proprietary-deception.de-diff.html 
                         proprietary-deception.de.po 
                         proprietary-deception.es-en.html 
                         proprietary-deception.es.po 
                         proprietary-deception.fr-en.html 
                         proprietary-deception.fr.po 
                         proprietary-deception.ja-diff.html 
                         proprietary-deception.ja.po 
                         proprietary-deception.pot 
                         proprietary-deception.ru-en.html 
                         proprietary-deception.ru.po 
                         proprietary-drm.de-diff.html 
                         proprietary-drm.de.po 
                         proprietary-drm.es-en.html 
                         proprietary-drm.es.po 
                         proprietary-drm.fr-en.html 
                         proprietary-drm.fr.po 
                         proprietary-drm.it-diff.html 
                         proprietary-drm.it.po 
                         proprietary-drm.ja-diff.html 
                         proprietary-drm.ja.po proprietary-drm.pot 
                         proprietary-drm.ru-en.html 
                         proprietary-drm.ru.po 
                         proprietary-fraud.es-en.html 
                         proprietary-fraud.es.po 
                         proprietary-fraud.fr-en.html 
                         proprietary-fraud.fr.po proprietary-fraud.pot 
                         proprietary-fraud.ru-en.html 
                         proprietary-fraud.ru.po 
                         proprietary-incompatibility.es-en.html 
                         proprietary-incompatibility.es.po 
                         proprietary-incompatibility.fr-en.html 
                         proprietary-incompatibility.fr.po 
                         proprietary-incompatibility.pot 
                         proprietary-incompatibility.ru-en.html 
                         proprietary-incompatibility.ru.po 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es-en.html 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr-en.html 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
                         proprietary-interference.de-diff.html 
                         proprietary-interference.de.po 
                         proprietary-interference.es-en.html 
                         proprietary-interference.es.po 
                         proprietary-interference.fr-en.html 
                         proprietary-interference.fr.po 
                         proprietary-interference.ja-diff.html 
                         proprietary-interference.ja.po 
                         proprietary-interference.pot 
                         proprietary-interference.ru-en.html 
                         proprietary-interference.ru.po 
                         proprietary-jails.de-diff.html 
                         proprietary-jails.de.po 
                         proprietary-jails.es-en.html 
                         proprietary-jails.es.po 
                         proprietary-jails.fr-en.html 
                         proprietary-jails.fr.po 
                         proprietary-jails.it-diff.html 
                         proprietary-jails.it.po 
                         proprietary-jails.ja-diff.html 
                         proprietary-jails.ja.po proprietary-jails.pot 
                         proprietary-jails.ru-en.html 
                         proprietary-jails.ru.po 
                         proprietary-manipulation.es-en.html 
                         proprietary-manipulation.es.po 
                         proprietary-manipulation.fr-en.html 
                         proprietary-manipulation.fr.po 
                         proprietary-manipulation.pot 
                         proprietary-manipulation.ru-en.html 
                         proprietary-manipulation.ru.po 
                         proprietary-obsolescence.es-en.html 
                         proprietary-obsolescence.es.po 
                         proprietary-obsolescence.fr-en.html 
                         proprietary-obsolescence.fr.po 
                         proprietary-obsolescence.pot 
                         proprietary-obsolescence.ru-en.html 
                         proprietary-obsolescence.ru.po 
                         proprietary-sabotage.de-diff.html 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.es-en.html 
                         proprietary-sabotage.es.po 
                         proprietary-sabotage.fr-en.html 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru-en.html 
                         proprietary-sabotage.ru.po 
                         proprietary-subscriptions.de-diff.html 
                         proprietary-subscriptions.de.po 
                         proprietary-subscriptions.es-en.html 
                         proprietary-subscriptions.es.po 
                         proprietary-subscriptions.fr-en.html 
                         proprietary-subscriptions.fr.po 
                         proprietary-subscriptions.ja-diff.html 
                         proprietary-subscriptions.ja.po 
                         proprietary-subscriptions.pot 
                         proprietary-subscriptions.ru-en.html 
                         proprietary-subscriptions.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es-en.html 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru-en.html 
                         proprietary-surveillance.ru.po 
                         proprietary-tethers.de-diff.html 
                         proprietary-tethers.de.po 
                         proprietary-tethers.es-en.html 
                         proprietary-tethers.es.po 
                         proprietary-tethers.fr-en.html 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.pt-br-diff.html 
                         proprietary-tethers.pt-br.po 
                         proprietary-tethers.ru-en.html 
                         proprietary-tethers.ru.po 
                         proprietary-tyrants.de-diff.html 
                         proprietary-tyrants.de.po 
                         proprietary-tyrants.es-en.html 
                         proprietary-tyrants.es.po 
                         proprietary-tyrants.fr-en.html 
                         proprietary-tyrants.fr.po 
                         proprietary-tyrants.it-diff.html 
                         proprietary-tyrants.it.po 
                         proprietary-tyrants.ja-diff.html 
                         proprietary-tyrants.ja.po 
                         proprietary-tyrants.pot 
                         proprietary-tyrants.pt-br-en.html 
                         proprietary-tyrants.pt-br.po 
                         proprietary-tyrants.ru-en.html 
                         proprietary-tyrants.ru.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.de.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.el.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.fr.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.hr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.it.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.ja.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.lt.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.pt-br.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.ru.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.tr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.uk.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.zh-cn.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.ar.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.de.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.el.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.es.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.fr.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.hr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.it.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.ja.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.lt.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.pt-br.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.ru.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.tr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.uk.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.zh-cn.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.de.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.el.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.es.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.fr.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.hr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.it.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ja.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ko.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.lt.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ml.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.nl.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.pl.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.pt-br.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.tr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.uk.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.zh-cn.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ar.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ca.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.de.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.es.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.it.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ja.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.lt.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ml.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.nl.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.pl.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.pt-br.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ru.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.sq.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.tr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.uk.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.zh-cn.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.es.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.hr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.ja.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.pt-br.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.tr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.uk.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.zh-cn.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.fr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.tr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.zh-cn.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.de-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.de.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.el-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.el.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.fr-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.fr.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.hr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.hr.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.it.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ja-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ja.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.lt-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.lt.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.pt-br-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.pt-br.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ru.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.tr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.tr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.uk-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.uk.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.zh-cn-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.zh-cn.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ar-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ar.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.de-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.de.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.el-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.el.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.es-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.es.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.fr-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.fr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.hr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.hr.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.it-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.it.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ja-en.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.lt-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.lt.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.pot?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.pt-br-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.pt-br.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ru-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.tr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.tr.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.uk-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.uk.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.zh-cn-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.zh-cn.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.de-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.el-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.el.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.es-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.es.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.fr-en.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.fr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.hr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.hr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.it-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.it.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ja-en.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ja.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ko-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ko.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.lt-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.lt.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ml-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ml.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.nl-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.nl.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pl-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pl.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pot?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pt-br-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pt-br.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.tr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.tr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.uk-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.uk.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.zh-cn-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.zh-cn.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ar-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ar.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ca-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ca.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.de-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.de.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.el-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.el.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.es-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.fr-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.fr.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.hr-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.hr.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.it-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.it.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ja-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.lt-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.lt.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ml-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ml.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.nl-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.nl.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pl-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pt-br-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pt-br.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ru-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.sq-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.sq.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.tr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.tr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.uk-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.uk.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.zh-cn-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.zh-cn.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.es-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.hr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.ja-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.pt-br-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.tr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.uk-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.zh-cn-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.fr.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.pot?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.tr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.tr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.zh-cn.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.fr.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.ru.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.zh-cn.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.zh-tw.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.fr.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.pot?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.tr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.tr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.zh-cn-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.zh-cn.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.fr-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.ru-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.zh-cn-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.zh-tw-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.es.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.fr.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.ru.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.tr.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ru.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.ru.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.ru.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.fr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.ru.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.fr.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.ru.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.fr.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.ru.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.fr.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.ru.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.fr.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.es.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.ru.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.es.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.fr.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.pt-br.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.ru.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pot?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.es.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.de.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.fr.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ja.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.pot?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ru-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ru.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.fr.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.pot?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.ru.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.es.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.fr.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.ru.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.pot?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pot?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.351&r2=1.352
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.555&r2=1.556
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.345&r2=1.346
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.642&r2=1.643
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.de.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.es-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.es.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ja.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pot?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pt-br-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pt-br.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.503&r2=1.504
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.230&r2=1.231

Patches:
Index: education/edu-cases-argentina-ecen.de.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.de.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- education/edu-cases-argentina-ecen.de.html  31 May 2020 05:01:40 -0000      
1.44
+++ education/edu-cases-argentina-ecen.de.html  10 Nov 2020 17:37:25 -0000      
1.45
@@ -49,12 +49,14 @@
 <h2><span xml:lang="es" lang="es">Escuela Cristiana Evangélica de Neuquén
 (ECEN)</span></h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Die folgenden Informationen wurden einem an uns eingesandten Bericht von der
 Grundschullehrerin Debora Badilla Huento (<abbr title="Escuela Cristiana
 Evangélica de Neuquén" xml:lang="es" lang="es">ECEN</abbr>) entnommen. Ihr
 Engagement spielte eine Schlüsselrolle, das Bewusstsein für Freie Software
 zu sensibilisieren und letztendlich die Schule zu migrieren.</p>
+</blockquote>
 
 <div class="article">
 <h3>Standort</h3>
@@ -181,9 +183,11 @@
 helfen.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Wir danken allen Beteiligten für die ausgezeichnete Arbeit bei der
 Migration.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -245,7 +249,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2020/05/31 05:01:40 $
+$Date: 2020/11/10 17:37:25 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.el.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.el.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-argentina-ecen.el.html  31 May 2020 05:01:13 -0000      
1.5
+++ education/edu-cases-argentina-ecen.el.html  10 Nov 2020 17:37:27 -0000      
1.6
@@ -48,12 +48,14 @@
 <div id="last-div" class="reduced-width">
 <h2>Χριστιανικό Ευαγγελικό Σχολείο του Neuquén 
(ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Οι ακόλουθες πληροφορίες αντλήθηκαν από 
μια αναφορά που υποβλήθηκε σε εμάς
 από τη Δασκάλα Πρωτοβάθμιας Εκπαίδευσης 
του ECEN Debora Badilla Huento. Η
 δική της δέσμευση έπαιξε έναν σπουδαίο 
ρόλο στην ευαισθητοποίηση για το
 Ελεύθερο Λογισμικό και, σε τελευταία ανάλυ
ση, για να οδηγηθεί το σχολείο
 στην πραγματοποίηση της μετάβασης.</p>
+</blockquote>
 
 <div class="article">
 <h3>Τοποθεσία</h3>
@@ -189,9 +191,11 @@
 κοινότητες.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Θα θέλαμε να εκφράσουμε την εκτίμησή μας 
προς όλους τους εμπλεκόμενους στην
 προσπάθεια μετάβασης για το εξαιρετικό 
έργο που επιτελέστηκε.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -255,7 +259,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ενημερώθηκε:
 
-$Date: 2020/05/31 05:01:13 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.es.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/edu-cases-argentina-ecen.es.html  31 May 2020 05:01:00 -0000      
1.11
+++ education/edu-cases-argentina-ecen.es.html  10 Nov 2020 17:37:27 -0000      
1.12
@@ -48,11 +48,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 La siguiente información se tomó de un informe que nos presentara Débora
 Badilla Huento, maestra de primaria de la ECEN. Su dedicación  desempeñó un
 papel fundamental en la toma de conciencia acerca del software libre en la
 escuela, lo que en última instancia condujo a la migración.</p>
+</blockquote>
 
 <div class="article">
 <h3>Ubicación</h3>
@@ -180,9 +182,11 @@
 otras comunidades educativas.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Queremos expresar nuestro agradecimiento a todas las personas involucradas
 en el proceso de la migración por la excelente labor realizada.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -242,7 +246,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/05/31 05:01:00 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.fr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.fr.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/edu-cases-argentina-ecen.fr.html  5 Oct 2020 13:13:17 -0000       
1.38
+++ education/edu-cases-argentina-ecen.fr.html  10 Nov 2020 17:37:27 -0000      
1.39
@@ -48,11 +48,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 L'information donnée ici est extraite d'un rapport qui nous a été soumis par
 Debora Badilla Huento, professeur du primaire à l'ECEN. Son engagement a
 joué un rôle clé dans la sensibilisation de l'école au logiciel libre, qui 
a
 abouti à sa migration.</p>
+</blockquote>
 
 <div class="article">
 <h3>Situation</h3>
@@ -181,9 +183,11 @@
 afin d'aider les autres communautés éducatives.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Nous voudrions exprimer notre gratitude à toutes les personnes impliquées
 dans l'effort de migration, pour leur excellent travail.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -245,7 +249,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:17 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.hr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.hr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-cases-argentina-ecen.hr.html  31 May 2020 05:02:15 -0000      
1.10
+++ education/edu-cases-argentina-ecen.hr.html  10 Nov 2020 17:37:27 -0000      
1.11
@@ -48,11 +48,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evang&eacute;lica de Neuqu&eacute;n (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Sljedeće informacije izdvojene su iz izvještaja kojeg nam je dostavila
 osnovnoškolska učiteljica iz ECEN-a Debora Badilla Huento. Njezina je
 predanost odigrala ključnu ulogu u podizanju svijesti o slobodnom softveru
 i, na kraju, dovela do prelaska škole na korištenje slobodnog softvera.</p>
+</blockquote>
 
 <div class="article">
 <h3>Lokacija</h3>
@@ -170,9 +172,11 @@
 širimo ono što smo naučili kako bismo pomogli drugim obrazovnim 
zajednicama.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Željeli bismo izraziti našu zahvalnost na izvrsno obavljenom poslu svim
 ljudima uključenima u proces migracije.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -230,7 +234,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Vrijeme zadnje izmjene:
 
-$Date: 2020/05/31 05:02:15 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.it.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.it.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-argentina-ecen.it.html  31 May 2020 05:02:41 -0000      
1.5
+++ education/edu-cases-argentina-ecen.it.html  10 Nov 2020 17:37:27 -0000      
1.6
@@ -48,11 +48,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Scuola Cristiana Evangelica di Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Le informazioni seguenti sono state estratte da una relazione inviataci da
 Debora Badilla Huento, insegnante elementare dell'ECEN. Il suo impegno ha
 giocato un ruolo chiave nell'opera di sensibilizzazione sul Software Libero
 e, alla fine, nell'ottenere che la scuola migrasse.</p>
+</blockquote>
 
 <div class="article">
 <h3>Ubicazione</h3>
@@ -179,9 +181,11 @@
 comunità educative.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Vorremmo esprimere il nostro apprezzamento per l'eccellente lavoro a tutti
 quanti sono stati coinvolti nello sforzo per la migrazione.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -241,7 +245,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2020/05/31 05:02:41 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.ja.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.ja.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/edu-cases-argentina-ecen.ja.html  31 Jul 2020 03:03:44 -0000      
1.32
+++ education/edu-cases-argentina-ecen.ja.html  10 Nov 2020 17:37:27 -0000      
1.33
@@ -48,9 +48,11 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 この情報は、ECENの小学校教師 Debora Badilla Huento
 が投稿したå 
±å‘Šã®æŠœç²‹ã§ã™ã€‚彼女の献身は、自由ソフトウェアへの関心を高め、さらに学æ
 ¡ã«ãŠã‘る完å…
¨ç§»è¡Œã«ã¨ã£ã¦é‡è¦ãªå½¹å‰²ã‚’果たしました。</p>
+</blockquote>
 
 <div class="article">
 <h3>所在地</h3>
@@ -131,8 +133,10 @@
 <p>献身と忍耐が必
要でしたが、作業は楽しいものでした。現在、われわれの経験を広å
 ±ã—、他の教育グループを支援しようとしています。</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 移行作業に参加くだ
さったすべての方のすばらしい尽力に感謝します。</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -184,7 +188,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2020/07/31 03:03:44 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.lt.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.lt.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-cases-argentina-ecen.lt.html  31 May 2020 05:03:07 -0000      
1.4
+++ education/edu-cases-argentina-ecen.lt.html  10 Nov 2020 17:37:27 -0000      
1.5
@@ -48,11 +48,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Tolimesnė informacija buvo ištraukta iš mums pristatytos ECEN pagrindų
 mokytojos Debora Badilla Huento ataskaitos. Jos įsipareigojimas atliko
 pagrindinį vaidmenį keliant Laisvos programinės įrangos supratimą ir
 galiausiai pasiekiant mokyklos migraciją.</p>
+</blockquote>
 
 <div class="article">
 <h3>Vieta</h3>
@@ -175,9 +177,11 @@
 bendruomenėms.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Mes norėtume išreikšti mūsų dėkingumą visiems žmonėms, dalyvavusiems 
toje
 migracijos pastangoje, už puikiai atliktą darbą.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -235,7 +239,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Atnaujinta:
 
-$Date: 2020/05/31 05:03:07 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.pt-br.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-argentina-ecen.pt-br.html       31 May 2020 05:03:35 
-0000      1.8
+++ education/edu-cases-argentina-ecen.pt-br.html       10 Nov 2020 17:37:27 
-0000      1.9
@@ -48,12 +48,14 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 As informações a seguir foram extraídas de um relatório que nos foi
 submetido pela professora de ensino primário da ECEN Debora Badilla
 Huento. O comprometimento dela representou um papel crítico em aumentar a
 consciência sobre o Software Livre e, principalmente, fazer com que a escola
 migrasse.</p>
+</blockquote>
 
 <div class="article">
 <h3>Localização</h3>
@@ -176,9 +178,11 @@
 comunidades educacionais.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Nós gostaríamos de expressar nossa apreciação pelo excelente trabalho feito
 a todas as pessoas envolvidas no esforço da migração.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -237,7 +241,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/05/31 05:03:35 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.ru.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.ru.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-argentina-ecen.ru.html  31 May 2020 05:03:49 -0000      
1.5
+++ education/edu-cases-argentina-ecen.ru.html  10 Nov 2020 17:37:27 -0000      
1.6
@@ -48,11 +48,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Христианская евангелистская школа 
Неукена (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Эта информация была извлечена из доклада, 
который нам представила
 учительница начальной школы ECEN Дебора 
Бадилла Хуенто. Ее приверженность
 идеям свободных программ сыграла ключевую 
роль в ознакомлении общества со
 свободными программами и в последующем 
переходе школы на них.</p>
+</blockquote>
 
 <div class="article">
 <h3>Местоположение</h3>
@@ -173,9 +175,11 @@
 приобретенным опытом, чтобы помочь другим 
образовательным сообществам.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Мы хотели бы выразить признательность за 
прекрасно проделаную работу всем
 людям, вовлеченным в процесс перехода.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -233,7 +237,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/05/31 05:03:49 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.tr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.tr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-cases-argentina-ecen.tr.html  31 May 2020 05:04:01 -0000      
1.4
+++ education/edu-cases-argentina-ecen.tr.html  10 Nov 2020 17:37:27 -0000      
1.5
@@ -48,10 +48,12 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Aşağıdaki bilgiler, ECEN İlkokul Öğretmeni Debora Badilla Huento 
tarafından
 bize sunulan bir rapordan alınmıştır. Kararlılığı Özgür Yazılım 
bilincini
 arttırmada ve nihayetinde okulu göç ettirmede kilit bir rol oynadı.</p>
+</blockquote>
 
 <div class="article">
 <h3>Yer</h3>
@@ -167,9 +169,11 @@
 topluluklarına yardımcı olmak için öğrendiklerimizi yayıyoruz.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Göç çabası içerisinde yer alan bütün insanlara, mükemmel çalışmalar 
için
 teşekkürlerimizi sunarız.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -236,7 +240,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/05/31 05:04:01 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.uk.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.uk.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/edu-cases-argentina-ecen.uk.html  31 May 2020 05:04:16 -0000      
1.7
+++ education/edu-cases-argentina-ecen.uk.html  10 Nov 2020 17:37:27 -0000      
1.8
@@ -48,12 +48,14 @@
 <div id="last-div" class="reduced-width">
 <h2>Християнська євангельська школа 
Неукена (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Наступні відомості, витягнуті з доповіді, 
яку нам представила  вчителька
 ECEN Дебора Баділля Хуенто. Її прихильність 
зіграла ключову роль у
 підвищенні обізнаності про вільне 
програмне забезпечення і, врешті-решт,
 призвела до переходу школи на 
використання вільного програмного
 забезпечення.</p>
+</blockquote>
 
 <div class="article">
 <h3>Розташування</h3>
@@ -172,9 +174,11 @@
 навчальним закладам.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Ми хотіли б висловити нашу вдячність за 
відмінно виконану роботу всім людям,
 які були залучені у процес міграції.</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -231,7 +235,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2020/05/31 05:04:16 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-argentina-ecen.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.zh-cn.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/edu-cases-argentina-ecen.zh-cn.html       31 May 2020 05:04:34 
-0000      1.2
+++ education/edu-cases-argentina-ecen.zh-cn.html       10 Nov 2020 17:37:27 
-0000      1.3
@@ -47,9 +47,11 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 以下信息摘自一份由ECEN小学教师Debora Badilla
 Huento提交给我们的报告。她的努力对自由软件的推广起了å…
³é”®ä½œç”¨ï¼Œä»Žè€Œæœ€ç»ˆä½¿è¯¥å­¦æ ¡è½¬å‘自由软件。</p>
+</blockquote>
 
 <div class="article">
 <h3>地点</h3>
@@ -129,8 +131,10 @@
 
<p>虽然它需要奉献和坚韧,整个过程还是令人愉悦的。现在我们ä¼
 æ’­æˆ‘们所学,以帮助其他教育社区。</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 我们感谢所有在此迁移过程中做出努力的人,你
们的工作是卓越的。</p>
+</blockquote>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -182,7 +186,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/05/31 05:04:34 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.ar.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.ar.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-india-ambedkar.ar.html  31 May 2020 05:01:00 -0000      
1.5
+++ education/edu-cases-india-ambedkar.ar.html  10 Nov 2020 17:37:27 -0000      
1.6
@@ -47,9 +47,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>مركز أمبيدكار اﻻجتماعي للحوسبة (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 المعلومات التالية تم إرسالها إلينا من قبل م
جموعة من المتطوعين الذين يعملون
 بالمركز.</p>
+</blockquote>
 
 <div class="article">
 <h3>موقع المركز</h3>
@@ -125,12 +127,14 @@
 اﻷثر في مساعدتهم على متابعة مقرراتهم الم
درسية والنجاح فيها بصورة مرضية.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 نحن نعلم بأن المجهودات الجبارة لمتطوعي 
البرمجيات الحرة في هذه المناطق
 المحرومة من المدينة تزداد يوماً بعد يوم، كم
ا تظهر نتائجها بصورة واضحة. إذا
 كنت ترغب بالمشاركة في هذا العمل، أو كنت 
ترغب بالتبرع بأجهزة حاسوب محمولة،
 يرجى التواصل معنا على البريد اﻻلكتروني <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>الصورة على هذه الصفحة مرخصة بموجب <a 
rel="license"
@@ -197,7 +201,7 @@
 <p class="unprintable"><!-- timestamp start -->
 تم التحديث في:
 
-$Date: 2020/05/31 05:01:00 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.de.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.de.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- education/edu-cases-india-ambedkar.de.html  31 May 2020 05:01:40 -0000      
1.53
+++ education/edu-cases-india-ambedkar.de.html  10 Nov 2020 17:37:27 -0000      
1.54
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Die folgenden Informationen stammen von ehrenamtlichen Mitarbeitern des
 Centers.</p>
+</blockquote>
 
 <div class="article">
 <h3>Standort</h3>
@@ -132,12 +134,14 @@
 abzuschließen.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Wir wurden darüber informiert, dass die herausragenden Leistungen
 ehrenamtlicher Freie-Software-Helfer in Brennpunkten der Stadt mit
 bemerkenswerten Ergebnissen expandiert. Wenn Sie dazu beitragen oder dieser
 Gruppe Notebooks spenden möchten, kontaktieren Sie uns bitte unter <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Das Bild in diesem Dokument ist lizenziert unter einer <a rel="license"
@@ -205,7 +209,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2020/05/31 05:01:40 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.el.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.el.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-cases-india-ambedkar.el.html  31 May 2020 05:01:14 -0000      
1.9
+++ education/edu-cases-india-ambedkar.el.html  10 Nov 2020 17:37:27 -0000      
1.10
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Κέντρο Πληροφορικής της Κοινότητας Ambedkar 
(AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Οι παρακάτω πληροφορίες μας παραχωρήθηκαν 
από την ομάδα εθελοντών που
 εργάζονται στο Κέντρο.</p>
+</blockquote>
 
 <div class="article">
 <h3>Τοποθεσία</h3>
@@ -134,12 +136,14 @@
 παρακολουθήσουν και να περάσουν με επιτυ
χία κι εκείνα τα μαθήματα.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Μαθαίνουμε ότι οι εξαιρετικές προσπάθειες 
των εθελοντών του Ελεύθερου
 Λογισμικού διευρύνονται σε αυτές τις υ
ποβαθμισμένες περιοχές της πόλης, με
 αξιοσημείωτα αποτελέσματα. Αν θα θέλατε να 
συνεισφέρετε ή να δωρίσετε
 φορητούς υπολογιστές σε αυτή την ομάδα, 
παρακαλώ ελάτε σε επαφή μαζί μας στο
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Η εικόνα σε αυτή τη σελίδα παρέχεται υπό 
την άδεια CC-BY-SA, <a
@@ -210,7 +214,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ενημερώθηκε:
 
-$Date: 2020/05/31 05:01:14 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.es.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.es.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/edu-cases-india-ambedkar.es.html  31 May 2020 05:01:00 -0000      
1.18
+++ education/edu-cases-india-ambedkar.es.html  10 Nov 2020 17:37:27 -0000      
1.19
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Centro de Computación Comunitario de Ambedkar (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 La siguiente información nos fue enviada por el grupo de voluntarios que
 trabajan en el Centro.</p>
+</blockquote>
 
 <div class="article">
 <h3>Ubicación</h3>
@@ -131,12 +133,14 @@
 éxito.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Nos informan que el excepcional esfuerzo de los voluntarios del software
 libre se está extendiendo por estas zonas marginadas de la ciudad con
 resultados notables. Si desea contribuir o donar portátiles a este grupo,
 por favor póngase en contacto con <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>La imagen que aparece en esta página se publica bajo la licencia CC-BY-SA,
@@ -203,7 +207,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/05/31 05:01:00 $
+$Date: 2020/11/10 17:37:27 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.fr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.fr.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- education/edu-cases-india-ambedkar.fr.html  5 Oct 2020 13:13:17 -0000       
1.41
+++ education/edu-cases-india-ambedkar.fr.html  10 Nov 2020 17:37:28 -0000      
1.42
@@ -49,9 +49,11 @@
 <h2>Centre informatique communautaire Ambedkar (<abbr title="Ambedkar Community
 Computing Center">AC3</abbr>)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 L'information donnée ici nous a été soumise par le groupe des bénévoles 
qui
 travaillent au Centre.</p>
+</blockquote>
 
 <div class="article">
 <h3>Situation</h3>
@@ -133,12 +135,14 @@
 succès.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 On nous a informé que les bénévoles du logiciel libre sont en train
 d'étendre leur action exceptionnelle dans ces quartiers défavorisés de la
 ville avec des résultats remarquables. Si vous voulez contribuer ou faire
 don de portables à ce groupe, merci de nous contacter à <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>L'illustration de cette page est sous licence CC-BY-SA, <a rel="license"
@@ -203,7 +207,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:17 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.hr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.hr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/edu-cases-india-ambedkar.hr.html  31 May 2020 05:02:15 -0000      
1.18
+++ education/edu-cases-india-ambedkar.hr.html  10 Nov 2020 17:37:28 -0000      
1.19
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Računalni centar zajednice Ambedkar (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Sljedeće informacije dostavila nam je grupa volontera koja radi u Računalnom
 centru zajednice Ambedkar.</p>
+</blockquote>
 
 <div class="article">
 <h3>Lokacija</h3>
@@ -127,12 +129,14 @@
 neprocjenjive pomoći u pohađanju i uspješnom polaganju tih tečajeva.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Obaviješteni smo da se izvanredan napor volontera slobodnog softvera u ovim
 zapostavljenim područjima grada proširuje, s rezultatima vrijednima
 pažnje. Ukoliko biste željeli doprinijeti ili donirati prijenosna računala
 ovoj grupi, molimo javite nam se na <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Fotografija je licencirana licencom CC-BY-SA, <a rel="license"
@@ -196,7 +200,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Vrijeme zadnje izmjene:
 
-$Date: 2020/05/31 05:02:15 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.it.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.it.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/edu-cases-india-ambedkar.it.html  31 May 2020 05:02:41 -0000      
1.30
+++ education/edu-cases-india-ambedkar.it.html  10 Nov 2020 17:37:28 -0000      
1.31
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Centro comunitario di informatica Ambedkar (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Le informazioni seguenti ci sono state riferite dal gruppo di volontari che
 lavora al centro. </p>
+</blockquote>
 
 <div class="article">
 <h3>Ubicazione</h3>
@@ -131,11 +133,13 @@
 superare questi corsi con successo. </p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Sappiamo che l'eccezionale sforzo dei volontari del software libero si sta
 espandendo in queste aree povere della città, con effetti degni di nota. Chi
 desidera contribuire a donare un computer a questo gruppo può contattarci a
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>La foto in questa pagina è distribuita sotto la licenza CC-BY-SA, <a
@@ -202,7 +206,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2020/05/31 05:02:41 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.ja.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.ja.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/edu-cases-india-ambedkar.ja.html  31 Jul 2020 03:03:44 -0000      
1.38
+++ education/edu-cases-india-ambedkar.ja.html  10 Nov 2020 17:37:28 -0000      
1.39
@@ -47,8 +47,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 下記の情å 
±ã¯ã€ã‚»ãƒ³ã‚¿ãƒ¼ã§æ´»å‹•ã™ã‚‹ãƒœãƒ©ãƒ³ãƒ†ã‚£ã‚¢ã‚°ãƒ«ãƒ¼ãƒ—から寄せられました。</p>
+</blockquote>
 
 <div class="article">
 <h3>所在地</h3>
@@ -102,9 +104,11 @@
 <p>センターの講義に出ている子供の中には、学æ 
¡ã§ã‚³ãƒ³ãƒ”ュータの授業を受けている子供もいます。そうした子供たちは、センターで習うスキルが学æ
 ¡ã§ã®æŽˆæ¥­ã‚’こなすのにとても役立っているのだ
と言っています。</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 
自由ソフトウェアボランティアによるすばらしい努力がこのような恵まれない地域へ注がれており、見事な成果をあげている、とのことです。このグループを手伝いたい、あるいはラップトップを寄付したいå
 ´åˆã«ã¯ã€<a
 
href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>までご連絡くã
 ã•ã„。</p>
+</blockquote>
 
 <div class="infobox">
 <p>このページの画像はCC-BY-SA <a rel="license"
@@ -162,7 +166,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2020/07/31 03:03:44 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.lt.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.lt.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/edu-cases-india-ambedkar.lt.html  31 May 2020 05:03:07 -0000      
1.7
+++ education/edu-cases-india-ambedkar.lt.html  10 Nov 2020 17:37:28 -0000      
1.8
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar bendruomenės kompiuterijos centras (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Toliau pateikta informacija mums buvo pristatyta tame Centre dirbančių
 savanorių grupės.</p>
+</blockquote>
 
 <div class="article">
 <h3>Vieta</h3>
@@ -132,12 +134,14 @@
 jiems yra neįkainojama pagalba sekti ir išlaikyti tuos kursus 
sėkmingai.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Mes esame informuoti, kad ši išskirtinė Laisvos programinės įrangos
 savanorių pastanga šiose miesto nepritekliaus teritorijose yra plečiama, su
 neįtikėtinais rezultatais. Jei jūs norite prisidėti ar šiai grupei 
paaukoti
 nešiojamus kompiuterius, prašome susisiekite su mumis <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Paveikslas Å¡iame puslapyje yra licencijuotas pagal CC-BY-SA, <a
@@ -202,7 +206,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Atnaujinta:
 
-$Date: 2020/05/31 05:03:07 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.pt-br.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-ambedkar.pt-br.html       31 May 2020 05:03:35 
-0000      1.8
+++ education/edu-cases-india-ambedkar.pt-br.html       10 Nov 2020 17:37:28 
-0000      1.9
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Centro de Computação Comunitária de Ambedkar (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 As informações a seguir nos foram submetidas pelo grupo de voluntários
 trabalhando no Centro.</p>
+</blockquote>
 
 <div class="article">
 <h3>Localização</h3>
@@ -133,12 +135,14 @@
 sucesso.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Nós fomos informados que o esforço impressionante dos voluntários de
 Software Livre está expandindo nessas áreas necessitadas da cidade, com
 resultados marcantes. Se você gostaria de contribuir ou doar laptops para
 esse grupo, por favor nos contate em <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>A imagem nesta página está licenciada sob a CC-BY-SA, a licença <a
@@ -205,7 +209,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/05/31 05:03:35 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.ru.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.ru.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-cases-india-ambedkar.ru.html  31 May 2020 05:03:49 -0000      
1.9
+++ education/edu-cases-india-ambedkar.ru.html  10 Nov 2020 17:37:28 -0000      
1.10
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Амбедкарский общественный 
вычислительный центр (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Эта информация была предоставлена нам 
группой добровольцев, работающих в
 упомянутом центре.</p>
+</blockquote>
 
 <div class="article">
 <h3>Местоположение</h3>
@@ -131,12 +133,14 @@
 успешно сдают экзамены.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Нам сообщают, что выдающиеся усилия 
активистов свободных программ охватывают
 все больше бедных районов города и дают 
замечательные результаты. Если вы
 хотите внести свой вклад или пожертвовать 
ноутбук этой группе, пожалуйста,
 свяжитесь с нами по адресу <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Изображение на этой странице доступно по 
лицензии CC-BY-SA, <a rel="license"
@@ -200,7 +204,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/05/31 05:03:49 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.tr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.tr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-india-ambedkar.tr.html  31 May 2020 05:04:01 -0000      
1.5
+++ education/edu-cases-india-ambedkar.tr.html  10 Nov 2020 17:37:28 -0000      
1.6
@@ -48,9 +48,11 @@
 <h2>Ambedkar Topluluğu Bilişim Merkezi (<abbr title="Ambedkar Community
 Computing Center">AC3</abbr>)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Aşağıdaki bilgiler Merkez'de çalışan gönüllü grup tarafından bize
 sunulmuştur.</p>
+</blockquote>
 
 <div class="article">
 <h3>Yer</h3>
@@ -128,12 +130,14 @@
 şekilde takip etmeleri ve geçmeleri için çok değerli olduğunu 
söylüyorlar.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Özgür Yazılım gönüllülerinin olağanüstü çabalarının, kentin bu 
yoksul
 bölgelerinde kayda değer sonuçlarla genişlediğini biliyoruz. Bu gruba
 katkıda bulunmak veya dizüstü bilgisayar bağışlamak istiyorsanız 
lütfen <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a> adresinden
 bize ulaşın.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Bu sayfadaki görüntü; CC-BY-SA, <a rel="license"
@@ -206,7 +210,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/05/31 05:04:01 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.uk.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.uk.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/edu-cases-india-ambedkar.uk.html  31 May 2020 05:04:16 -0000      
1.12
+++ education/edu-cases-india-ambedkar.uk.html  10 Nov 2020 17:37:28 -0000      
1.13
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Амбедкарський громадський 
обчислювальний центр (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Наступна інформація надіслана нам групою 
добровольців, які працюють у
 Центрі.</p>
+</blockquote>
 
 <div class="article">
 <h3>Місцезнаходження</h3>
@@ -131,12 +133,14 @@
 неоціненну допомогу у відвідуванні та 
успішного складання цих курсів.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 Нам повідомили, що вагомі зусилля 
добровольців вільного програмного
 забезпечення поширюються в ці бідні 
райони міста з чудовими
 результатами. Якщо ви хочете внести свій 
внесок або подарувати ноутбуки для
 цієї групи, будь ласка, напишіть нам на <a
 href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>Зображення на цій сторінці доступне на 
умовах ліцензії CC-BY-SA, <a
@@ -203,7 +207,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2020/05/31 05:04:16 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-ambedkar.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.zh-cn.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/edu-cases-india-ambedkar.zh-cn.html       31 May 2020 05:04:34 
-0000      1.6
+++ education/edu-cases-india-ambedkar.zh-cn.html       10 Nov 2020 17:37:28 
-0000      1.7
@@ -47,8 +47,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar社区计算中心(AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 以下信息是由在该计算中心工作的一组志愿者
提交给我们的。</p>
+</blockquote>
 
 <div class="article">
 <h3>地点</h3>
@@ -100,9 +102,11 @@
 <p>其中一些孩子在学校也参加
了计算课程。他们汇报说在中心学到的技术非常有价值,帮助他们学ä¹
 å¹¶æˆåŠŸé€šè¿‡å­¦æ ¡çš„课程。</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 我们被告知引人注目的自由软件志愿者
正在该贫困地区扩展,而且成绩斐然。如果你
愿意为该组织贡献或捐献笔记本电脑,请通过<a
 
href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>联系我们。</p>
+</blockquote>
 
 <div class="infobox">
 <p>本页面的图片使用CC-BY-SA,<a rel="license"
@@ -160,7 +164,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/05/31 05:04:34 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.de.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.de.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- education/edu-cases-india-irimpanam.de.html 25 Jul 2020 20:00:27 -0000      
1.59
+++ education/edu-cases-india-irimpanam.de.html 10 Nov 2020 17:37:28 -0000      
1.60
@@ -48,8 +48,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Die folgenden Informationen stammen von Lehrkräften der Schule.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Standort</h3>
@@ -298,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.el.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.el.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/edu-cases-india-irimpanam.el.html 25 Jul 2020 20:00:27 -0000      
1.13
+++ education/edu-cases-india-irimpanam.el.html 10 Nov 2020 17:37:28 -0000      
1.14
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ανώτερο Δευτεροβάθμιο Επαγγελματικό 
Σχολείο του Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Η ακόλουθη αναφορά βασίζεται σε 
πληροφορίες που μας παραχώρησε το 
προσωπικό
 του σχολείου.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Τοποθεσία</h3>
@@ -312,7 +314,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ενημερώθηκε:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.es.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.es.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/edu-cases-india-irimpanam.es.html 21 Jun 2020 10:58:50 -0000      
1.42
+++ education/edu-cases-india-irimpanam.es.html 10 Nov 2020 17:37:28 -0000      
1.43
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Escuela Vocacional de Secundaria Superior Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 El siguiente caso está basado en información suministrada por el personal de
 la escuela.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Ubicación</h3>
@@ -293,7 +295,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/21 10:58:50 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.fr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.fr.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- education/edu-cases-india-irimpanam.fr.html 5 Oct 2020 13:13:17 -0000       
1.60
+++ education/edu-cases-india-irimpanam.fr.html 10 Nov 2020 17:37:28 -0000      
1.61
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Lycée professionnel d'Irimpanam (VHSS Irimpanam)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 L'article ci-dessous est basé sur les informations que nous a fournies
 l'équipe pédagogique de l'école.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Situation</h3>
@@ -298,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:17 $
+$Date: 2020/11/10 17:37:28 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.hr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.hr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/edu-cases-india-irimpanam.hr.html 25 Jul 2020 20:00:27 -0000      
1.21
+++ education/edu-cases-india-irimpanam.hr.html 10 Nov 2020 17:37:29 -0000      
1.22
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Strukovna viša srednja škola Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Izvještaj naveden u daljnjem tekstu je temeljen na informacijama dobivenim
 od Å¡kolskog osoblja. </p>         
+</blockquote>
 
 <div class="article">
 <h3>Lokacija</h3>
@@ -289,7 +291,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Zadnji put promijenjeno:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.it.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.it.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/edu-cases-india-irimpanam.it.html 25 Jul 2020 20:00:27 -0000      
1.39
+++ education/edu-cases-india-irimpanam.it.html 10 Nov 2020 17:37:29 -0000      
1.40
@@ -47,9 +47,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Scuola professionale di Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Il seguente resoconto è basato su informazioni forniteci dallo staff della
 scuola.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Ubicazione</h3>
@@ -291,7 +293,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.ja.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ja.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/edu-cases-india-irimpanam.ja.html 31 Jul 2020 03:03:44 -0000      
1.42
+++ education/edu-cases-india-irimpanam.ja.html 10 Nov 2020 17:37:29 -0000      
1.43
@@ -48,8 +48,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 下記の報告は学校スタッフから寄せられた情å 
±ã«åŸºã¥ã„ています。</p>         
+</blockquote>
 
 <div class="article">
 <h3>所在地</h3>
@@ -215,7 +217,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2020/07/31 03:03:44 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.ko.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ko.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/edu-cases-india-irimpanam.ko.html 25 Jul 2020 20:00:27 -0000      
1.13
+++ education/edu-cases-india-irimpanam.ko.html 10 Nov 2020 17:37:29 -0000      
1.14
@@ -47,8 +47,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 이 보고서는 해당 학교 직원에게서 받은 정보를 기반으로 
작성되었습니다. </p>         
+</blockquote>
 
 <div class="article">
 <h3>위치</h3>
@@ -237,7 +239,7 @@
 <p class="unprintable"><!-- timestamp start -->
 최종 수정일:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.lt.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.lt.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-irimpanam.lt.html 25 Jul 2020 20:00:27 -0000      
1.8
+++ education/edu-cases-india-irimpanam.lt.html 10 Nov 2020 17:37:29 -0000      
1.9
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Profesinė aukštesnioji pagrindinė mokykla Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Toliau pateikta ataskaita yra paremta mokyklos darbuotojų suteikta
 informacija.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Vieta</h3>
@@ -296,7 +298,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Atnaujinta:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.ml.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ml.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/edu-cases-india-irimpanam.ml.html 10 Jul 2020 13:59:53 -0000      
1.6
+++ education/edu-cases-india-irimpanam.ml.html 10 Nov 2020 17:37:29 -0000      
1.7
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>വൊക്കേഷനല്‍ ഹയര്‍ 
സെക്കണ്ടറി സ്കൂള്‍ 
ഇരിമ്പനം</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 താഴെ കൊടുത്തിരിക്കുന്ന 
റിപ്പോര്‍ട്ട് ആ 
വിദ്യാലയത്തിലെ സ്റ്റാഫ് തന്ന
 വിവരങ്ങളെ അടിസ്ഥാനമാക്കി 
ഉള്ളതാണ്.</p>         
+</blockquote>
 
 <div class="article">
 <h3>സ്ഥാനം</h3>
@@ -306,7 +308,7 @@
 <p class="unprintable"><!-- timestamp start -->
 പുതുക്കിയതു്:
 
-$Date: 2020/07/10 13:59:53 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.nl.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.nl.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-irimpanam.nl.html 22 Jun 2020 10:01:51 -0000      
1.8
+++ education/edu-cases-india-irimpanam.nl.html 10 Nov 2020 17:37:29 -0000      
1.9
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Hogere middelbare school voor beroepsonderwijs Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Het volgende verslag is gebaseerd op informatie verstrekt door het
 schoolpersoneel.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Locatie</h3>
@@ -292,7 +294,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2020/06/22 10:01:51 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.pl.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.pl.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-cases-india-irimpanam.pl.html 22 Jun 2020 12:02:44 -0000      
1.10
+++ education/edu-cases-india-irimpanam.pl.html 10 Nov 2020 17:37:29 -0000      
1.11
@@ -47,9 +47,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Zawodowa Szkoła w&nbsp;Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Poniższy artykuł opiera się na&nbsp;informacjach dostarczonych przez
 personel szkoły.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Lokalizacja</h3>
@@ -309,7 +311,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualizowane:
 
-$Date: 2020/06/22 12:02:44 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.pt-br.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-cases-india-irimpanam.pt-br.html      22 Jun 2020 13:01:13 
-0000      1.9
+++ education/edu-cases-india-irimpanam.pt-br.html      10 Nov 2020 17:37:29 
-0000      1.10
@@ -48,9 +48,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Escola de Ensino Profissionalizante de Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 O relatório a seguir baseou-se na informação que nos foi fornecida pela
 equipe da escola.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Local</h3>
@@ -291,7 +293,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/06/22 13:01:13 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.ru.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/edu-cases-india-irimpanam.ru.html 20 Jun 2020 19:58:48 -0000      
1.11
+++ education/edu-cases-india-irimpanam.ru.html 10 Nov 2020 17:37:29 -0000      
1.12
@@ -48,8 +48,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ирумпанамское старшее среднее 
профессиональное училище</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Данный отчет основан на информации, 
предоставленной сотрудниками училища.</p>     
    
+</blockquote>
 
 <div class="article">
 <h3>Месторасположение</h3>
@@ -290,7 +292,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/20 19:58:48 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.tr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.tr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/edu-cases-india-irimpanam.tr.html 21 Jun 2020 07:59:07 -0000      
1.6
+++ education/edu-cases-india-irimpanam.tr.html 10 Nov 2020 17:37:29 -0000      
1.7
@@ -47,9 +47,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Irimpanam Mesleki Okulu</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Aşağıdaki rapor, okul personeli tarafından bize verilen bilgilere
 dayanmaktadır.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Yer</h3>
@@ -289,7 +291,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/06/21 07:59:07 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.uk.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.uk.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/edu-cases-india-irimpanam.uk.html 25 Jul 2020 20:00:27 -0000      
1.15
+++ education/edu-cases-india-irimpanam.uk.html 10 Nov 2020 17:37:29 -0000      
1.16
@@ -48,8 +48,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ірімпанамська річна вища середня 
школа</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 Наступний звіт базується на інформації, 
наданій нам працівниками школи.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Місцезнаходження</h3>
@@ -289,7 +291,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-cases-india-irimpanam.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.zh-cn.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-irimpanam.zh-cn.html      21 Jun 2020 02:29:15 
-0000      1.8
+++ education/edu-cases-india-irimpanam.zh-cn.html      10 Nov 2020 17:37:29 
-0000      1.9
@@ -47,8 +47,10 @@
 <div  id="last-div" class="reduced-width">
 <h2>Irimpanam高级职业中学</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 下述报告根据该中学教职员工为我们提供的信息完成。</p>   
      
+</blockquote>
 
 <div class="article">
 <h3>地点</h3>
@@ -213,7 +215,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/06/21 02:29:15 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.ar.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ar.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- education/edu-schools.ar.html       6 Oct 2020 08:41:56 -0000       1.35
+++ education/edu-schools.ar.html       10 Nov 2020 17:37:29 -0000      1.36
@@ -42,12 +42,13 @@
 بقلم <a href="http://www.stallman.org/";>ريتشارد ستولم
ان</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 على الأنشطة التعليمية، متضمنة المدارس من 
جميع المراحل، أي من رياض الأطفال
 حتى الجامعة، أن تمتلك واجبًا أخلاقيًا 
لتدرس <a
 href="/education/education.html">البرامج الحرة فقط.</a></p>
 
-<p class="italic">على جميع مستخدمي الكومبيوتر <a
+<p>على جميع مستخدمي الكومبيوتر <a
 href="/philosophy/free-software-even-more-important.html">الاصرار على
 البرمجيات الحرّة</a>، فهي تمنح المستخدمين 
الحرّية في التحكم في
 كومبيوتراتهم&mdash;أما مع البرمجيات 
الاحتكارية، يفعل البرنامج ما يريد مالكه
@@ -55,6 +56,7 @@
 المستخدمين الحرّية ليتعاونوا مع بعضهم 
البعض ليعيشوا حياة هنيئة. هذه الأسباب
 تنطبق على المدارس كما تنطبق على كل فرد. 
ولكن موضوع هذا المقال هو عرض الأسباب
 الإضافية التي تنطبق على التعليم خاصة.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>يمكن للبرمجيات الحرّة أن تحافظ على أموال 
المدارس، ولكن هذه فائدة ثانوية. حفظ
@@ -201,7 +203,7 @@
 <p class="unprintable"><!-- timestamp start -->
 حُدّثت بتاريخ:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.ca.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ca.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- education/edu-schools.ca.html       6 Oct 2020 08:41:56 -0000       1.28
+++ education/edu-schools.ca.html       10 Nov 2020 17:37:29 -0000      1.29
@@ -42,12 +42,13 @@
 per <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Tota tasca educativa (incloent-hi la de les escoles, des de les guarderies
 fins a la universitat) té el deure moral de <a
 href="/education/education.html">ensenyar només programari lliure.</a></p>
 
-<p class="italic">Tots els usuaris d'ordinadors haurien d'<a
+<p>Tots els usuaris d'ordinadors haurien d'<a
 href="/philosophy/free-software-even-more-important.html"> insistir en el
 programari lliure</a>: proporciona als usuaris la llibertat de controlar els
 seus propis ordinadors&mdash;amb programari privatiu, l'ordinador fa el que
@@ -56,6 +57,7 @@
 entre ells i portar una vida honesta. Aquestes raons poden aplicar-se a les
 escoles igual que les apliquem als usuaris. El propòsit d'aquest article és
 afegir raons que s'apliquen específicament a l'educació.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>El programari lliure pot ajudar les escoles a estalviar diners, però aquest
@@ -221,7 +223,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Updated:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.de.html
===================================================================
RCS file: /web/www/www/education/edu-schools.de.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- education/edu-schools.de.html       6 Oct 2020 08:41:56 -0000       1.47
+++ education/edu-schools.de.html       10 Nov 2020 17:37:29 -0000      1.48
@@ -42,12 +42,13 @@
 von <a href="//www.stallman.org/">Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Pädagogische Einrichtungen (einschließlich Schulen aller Stufen von
 Vorschule bis Universität) haben eine moralische Verpflichtung <a
 href="/education/">nur Freie Software zu lehren</a>.</p>
 
-<p class="italic"><span class="intro">Alle Rechnernutzer sollten <a
+<p><span class="intro">Alle Rechnernutzer sollten <a
 href="/philosophy/free-software-even-more-important.html">auf Freie Software
 bestehen</a>: sie gibt Nutzern die Freiheit, ihre eigenen Rechner zu
 kontrollieren&#160;&#8209;&#160;mit proprietärer Software macht das Programm
@@ -56,6 +57,7 @@
 zusammenzuarbeiten, ein aufrechtes Leben zu führen. Diese Gründe gelten für
 Schulen wie für jeden Einzelnen. Dieser Artikel soll weitere Gründe nennen,
 die im Besonderen für den Bereich Bildung gelten.</span></p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Freie Software kann Schulen Geld einsparen, aber das ist nur ein
@@ -270,7 +272,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.es.html
===================================================================
RCS file: /web/www/www/education/edu-schools.es.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- education/edu-schools.es.html       6 Oct 2020 08:41:56 -0000       1.45
+++ education/edu-schools.es.html       10 Nov 2020 17:37:29 -0000      1.46
@@ -42,13 +42,14 @@
 por <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Las actividades relacionadas con la educación (incluidas las escuelas de
 todos los niveles, desde preescolar hasta la universidad) tienen <a
 href="/education/education.html">el deber moral de enseñar únicamente
 software libre</a>.</p>
 
-<p class="italic">Todos los usuarios de ordenadores deben <a
+<p>Todos los usuarios de ordenadores deben <a
 href="/philosophy/free-software-even-more-important.html">insistir en que el
 software sea libre</a>: el software libre otorga a los usuarios la libertad
 de controlar sus  propios ordenadores; con el software privativo, en cambio,
@@ -58,6 +59,7 @@
 se aplican tanto a las  escuelas como a cualquier persona, aunque el
 propósito de este artículo es plantear los motivos adicionales que interesan
 específicamente a la  educación.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>El software libre supone un ahorro económico para las escuelas, pero este 
es
@@ -231,7 +233,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.fr.html
===================================================================
RCS file: /web/www/www/education/edu-schools.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- education/edu-schools.fr.html       6 Oct 2020 08:41:56 -0000       1.54
+++ education/edu-schools.fr.html       10 Nov 2020 17:37:29 -0000      1.55
@@ -42,13 +42,14 @@
 par <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Les activités liées à l'éducation, y compris les écoles depuis le jardin
 d'enfants jusqu'à l'université, ont pour <a
 href="/education/education.html">devoir moral de n'enseigner que le logiciel
 libre</a>.</p>
 
-<p class="italic">Tout utilisateur d'informatique devrait <a
+<p>Tout utilisateur d'informatique devrait <a
 href="/philosophy/free-software-even-more-important.html">exiger des
 logiciels libres</a> car ils lui donnent la possibilité de contrôler son
 propre ordinateur – avec les logiciels privateurs en effet,<a
@@ -59,6 +60,7 @@
 raisons s'appliquent aux écoles comme à tout le monde. Toutefois, le but de
 cet article est de présenter les arguments supplémentaires qui s'appliquent
 spécifiquement à l'éducation.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Le logiciel libre fait économiser de l'argent aux écoles, mais c'est un
@@ -234,7 +236,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.it.html
===================================================================
RCS file: /web/www/www/education/edu-schools.it.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/edu-schools.it.html       6 Oct 2020 08:41:56 -0000       1.32
+++ education/edu-schools.it.html       10 Nov 2020 17:37:29 -0000      1.33
@@ -42,12 +42,13 @@
 di <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Le istituzioni didattiche in genere, dalla scuola materna all'università,
 hanno il dovere morale di <a href="/education/education.html">insegnare solo
 il software libero</a>.</p>
 
-<p class="italic">Tutti gli utenti informatici devono  <a
+<p>Tutti gli utenti informatici devono  <a
 href="/philosophy/free-software-even-more-important.html">insistere con il
 software libero</a>: esso offre agli utenti la libertà di poter controllare
 il proprio computer; con il software proprietario il programma fa quanto
@@ -57,6 +58,7 @@
 qualsiasi altro soggetto. Lo scopo di questo articolo è di evidenziare le
 caratteristiche che si applicano in modo specifico al settore
 dell'istruzione.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Il software libero consente alle scuole di risparmiare, anche se questo è 
un
@@ -226,7 +228,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.ja.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ja.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- education/edu-schools.ja.html       6 Oct 2020 08:41:56 -0000       1.37
+++ education/edu-schools.ja.html       10 Nov 2020 17:37:30 -0000      1.38
@@ -41,12 +41,14 @@
 <a 
href="http://www.stallman.org/";>リチャード・ストールマン</a>著</address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 教育活動(幼稚園から大学までのすべての段階の学æ 
¡ã‚’含む)には<a
 href="/education/education.html">自由なソフトウェアだ
けを教える</a>道徳的義務があります。</p>
 
-<p class="italic">すべてのコンピュータのユーザは<a
+<p>すべてのコンピュータのユーザは<a
 
href="/philosophy/free-software-even-more-important.html">自由なソフトウェアを強く主張すべきです</a>:自由なソフトウェアはユーザが自分のコンピュータをコントロールする自由を与えてくれます&mdash;プロプライエタリなソフトウェアでは、コンピュータはソフトウェアの所有è€
…あるいは開発者が欲することを実行し、これは必
ずしもユーザが実行したいことと同じとは限りません。自由なソフトウェアはまた、ユーザがお互いに協力し、まっすぐな生活を送るための自由を与えてくれます。こうした道理は、万人にそうであるように、学æ
 ¡ã«å¯¾ã—てもあてはまりますが、この文章
の目的は、とくに教育についてあてはまる追加
の理由を述べることです。</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>自由なソフトウェアにより学æ 
¡ã®çµŒè²»ã‚’節約することができますが、これは二義的なものです。節約が可能なのは、自由なソフトウェアは他のユーザと同様に学æ
 ¡ã«å¯¾ã—てもソフトウェアの複製や再é…
å¸ƒã‚’行う自由を与えてくれるからです。そのため、学æ 
¡ã‚·ã‚¹ãƒ†ãƒ ã§ã¯ã‚³ãƒ”ーをすべての学æ 
¡ã«ä¸Žãˆã‚‹ã“とができ、それぞれの学æ 
¡ã§ã¯ã€ãã†ã™ã‚‹ã“とにより、支払う義務なく、プログラム
をすべてのコンピュータにインストールすることができます。</p>
@@ -145,7 +147,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.lt.html
===================================================================
RCS file: /web/www/www/education/edu-schools.lt.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-schools.lt.html       6 Oct 2020 08:41:56 -0000       1.8
+++ education/edu-schools.lt.html       10 Nov 2020 17:37:30 -0000      1.9
@@ -42,12 +42,13 @@
 Pagal <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Švietėjiškos veiklos, įskaitant visų lygių &ndash; nuo darželio iki
 universiteto, mokyklas, turi moralinę pareigą <a
 href="/education/education.html">mokyti tik laisvą programinę įrangą
.</a></p>
 
-<p class="italic">Visi kompiuterių naudotojai turi <a
+<p>Visi kompiuterių naudotojai turi <a
 href="/philosophy/free-software-even-more-important.html">reikalauti laisvos
 programinės įrangos</a>: ji naudotojams suteikia laisvę kontroliuoti jų
 pačių kompiuterius &ndash; su nuosavybine programine įranga, programa daro
@@ -57,6 +58,7 @@
 Šios priežastys taikytinos mokykloms, kaip ir visiems kitiems.  Tačiau, šio
 straipsnio tikslas yra pateikti papildomas priežastis, kurios taikytinos
 konkrečiai švietimui.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Laisva programinė įranga gali mokykloms sutaupyti pinigų, bet tai yra
@@ -228,7 +230,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Atnaujinta:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.ml.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ml.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/edu-schools.ml.html       6 Oct 2020 08:41:56 -0000       1.30
+++ education/edu-schools.ml.html       10 Nov 2020 17:37:30 -0000      1.31
@@ -42,13 +42,14 @@
 എഴുതിയതു് <a 
href="http://www.stallman.org/";>റിച്ചാര്‍ഡ് 
സ്റ്റാള്‍മാന്‍</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 നേഴ്സറി തൊട്ട് സർവകലാശാല വരെ 
ഉൾപ്പെടുന്ന എല്ലാ 
തലങ്ങളിലുമുള്ള
 വിദ്യാലയങ്ങൾക്കും, 
വിദ്യാഭ്യാസപരമായ 
പ്രവര്‍ത്തനങ്ങള്‍ക്കായി <a
 
href="/education/education.html">സ്വതന്ത്രസോഫ്റ്റ്‌വെയര്‍
 മാത്രം
 പഠിപ്പിക്കാനുള്ള</a> 
ധാര്‍മ്മികമായ കര്‍ത്തവ്യം 
ഉണ്ട്.</p>
 
-<p class="italic">എല്ലാ കമ്പ്യുട്ടര്‍ 
ഉപയോക്താക്കളും <a
+<p>എല്ലാ കമ്പ്യുട്ടര്‍ 
ഉപയോക്താക്കളും <a
 href="/philosophy/free-software-even-more-important.html">
 സ്വതന്ത്രസോഫ്റ്റ്‌വെയര്‍ 
നിർബന്ധമായും 
ഉപയോഗിക്കേണ്ടതിനു്</a> 
പൊതുവായ ചില
 കാരണങ്ങളുണ്ടു്. അതു് 
ഉപയോക്താക്കള്‍ക്കു് സ്വന്തം 
കമ്പ്യൂട്ടര്‍
@@ -60,6 +61,7 @@
 പറഞ്ഞതെല്ലാം 
ഏവര്‍ക്കുമെന്നപോലെ 
വിദ്യാലയങ്ങള്‍ക്കും
 ബാധകമാണു്. എന്തിരുന്നാലും, 
കൃത്യമായി വിദ്യാഭ്യാസ 
മേഖലയെ സംബന്ധിക്കുന്ന
 കൂടുതൽ കാരണങ്ങൾ നല്‍കുക 
എന്നതാണ് ഈ പ്രബന്ധത്തിന്റെ 
ഉദ്ദേശ്യം.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>വിദ്യാലയങ്ങളുടെ പണം 
ലാഭിക്കാൻ 
സ്വതന്ത്രസോഫ്റ്റ്‌വെയറിനു 
കഴിയും, പക്ഷെ ഇത്
@@ -266,7 +268,7 @@
 <p class="unprintable"><!-- timestamp start -->
 പുതുക്കിയതു്:
 
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.nl.html
===================================================================
RCS file: /web/www/www/education/edu-schools.nl.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/edu-schools.nl.html       6 Oct 2020 08:41:57 -0000       1.21
+++ education/edu-schools.nl.html       10 Nov 2020 17:37:30 -0000      1.22
@@ -42,12 +42,13 @@
 door <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Onderwijsinstellingen, van basisschool tot universiteit, hebben een <a
 href="/education/education.html">morele verplichting alleen vrije software
 te onderwijzen</a>.</p>
 
-<p class="italic">Alle computergebruikers zouden moeten <a
+<p>Alle computergebruikers zouden moeten <a
 href="/philosophy/free-software-even-more-important.html"> aandringen op het
 gebruik van vrije software</a>: het geeft gebruikers de vrijheid om controle
 te hebben over hun eigen computers&mdash;met niet-vrije software doet het
@@ -56,6 +57,7 @@
 werken en een fatsoenlijk leven te leiden. Deze redenen gelden voor
 iedereen, dus ook voor scholen. Dit artikel concentreert zich op argumenten
 die specifiek gelden voor het onderwijs.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Allereerst kan vrije software scholen geld besparen, maar dit is
@@ -223,7 +225,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2020/10/06 08:41:57 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.pl.html
===================================================================
RCS file: /web/www/www/education/edu-schools.pl.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- education/edu-schools.pl.html       6 Oct 2020 08:41:57 -0000       1.26
+++ education/edu-schools.pl.html       10 Nov 2020 17:37:30 -0000      1.27
@@ -42,12 +42,13 @@
 <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Działalności edukacyjne, w&nbsp;tym również szkoły, mają obowiązek 
moralny
 aby&nbsp;<a href="/education/education.html">nauczać wyłącznie
 na&nbsp;wolnym oprogramowaniu.</a></p>
 
-<p class="italic">Każdy użytkownik komputera powinien <a
+<p>Każdy użytkownik komputera powinien <a
 href="/philosophy/free-software-even-more-important.html">nalegać
 na&nbsp;używanie wolnego oprogramowania</a>: daje ono użytkownikom 
możliwość
 kontrolowania ich własnych komputerów&nbsp;&ndash; przy oprogramowaniu
@@ -57,6 +58,7 @@
 prowadzenia uczciwego stylu użycia. To dotyczy wszystkich, nie tylko
 w&nbsp;szkołach. Ten artykuł przedstawia dlaczego to jest szczególnie ważne
 w&nbsp;przypadku szkół.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Wolne oprogramowanie pozwala zaoszczędzić szkołom mnóstwo pieniędzy,
@@ -239,7 +241,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualizowane:
 
-$Date: 2020/10/06 08:41:57 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-schools.pt-br.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/edu-schools.pt-br.html    6 Oct 2020 08:41:57 -0000       1.38
+++ education/edu-schools.pt-br.html    10 Nov 2020 17:37:30 -0000      1.39
@@ -42,12 +42,13 @@
 por <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Atividades educacionais, incluindo escolas de todos os níveis desde a
 pré-escola até a universidade, têm o dever moral de <a
 href="/education/education.html">ensinar apenas software livre</a>.</p>
 
-<p class="italic">Todos os usuários de computadores devem <a
+<p>Todos os usuários de computadores devem <a
 href="/philosophy/free-software-even-more-important.html">insistir em
 software livre</a>: ele dá aos usuários a liberdade de controlar seus
 próprios computadores&mdash;com software proprietário, o programa faz o que
@@ -56,6 +57,7 @@
 vida com retidão. Essas razões se aplicam às escolas, assim como a qualquer
 pessoa. Porém, o propósito deste artigo é expor razões adicionais que se
 aplicam especificamente à educação.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>O software livre pode poupar dinheiro às escolas, mas este é um benefício
@@ -236,7 +238,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/10/06 08:41:57 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.ru.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ru.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/edu-schools.ru.html       6 Oct 2020 08:42:01 -0000       1.42
+++ education/edu-schools.ru.html       10 Nov 2020 17:37:30 -0000      1.43
@@ -42,12 +42,13 @@
 <a href="http://www.stallman.org/";>Ричард Столмен</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Образовательные учреждения, в том числе 
учебные заведения всех уровней от
 детских садов до вузов, обязаны <a
 href="/education/education.html">преподавать только 
свободные программы</a>.</p>
 
-<p class="italic">Все пользователи компьютеров 
должны <a
+<p>Все пользователи компьютеров должны <a
 href="/philosophy/free-software-even-more-important.html">настаивать 
на
 свободных программах</a>: они дают 
пользователям свободу контролировать свои
 компьютеры&nbsp;&mdash; когда программа 
несвободна, она делает то, чего
@@ -56,6 +57,7 @@
 другом, вести честную жизнь. Эти аргументы 
применимы к к учебным заведениям
 так же, как и ко всем. Однако цель этой 
статьи&nbsp;&mdash; представить
 дополнительные доводы, которые применимы 
именно к сфере образования.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Свободные программы могут сберечь 
учебному заведению деньги, но это
@@ -228,7 +230,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.sq.html
===================================================================
RCS file: /web/www/www/education/edu-schools.sq.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- education/edu-schools.sq.html       6 Oct 2020 08:42:01 -0000       1.19
+++ education/edu-schools.sq.html       10 Nov 2020 17:37:30 -0000      1.20
@@ -42,12 +42,13 @@
 nga <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Veprimtaritë arsimore, përfshi shkollat e të gjitha niveleve, nga kopshtet
 deri në universitete, kanë një detyrim moral <a
 href="/education/education.html">të japin mësim vetëm software të 
lirë.</a></p>
 
-<p class="italic">Krejt përdoruesit e kompjuterit do të duhej <a
+<p>Krejt përdoruesit e kompjuterit do të duhej <a
 href="/philosophy/free-software-even-more-important.html"> të ngulnin këmbë
 në software-in e lirë</a>: ai u jep përdoruesve lirinë për të kontrolluar
 kompjuterin e tyre &mdash; me software-in pronësor, kompjuteri bën atë çka
@@ -56,6 +57,7 @@
 me njëri-tjetrin, për të rrojtur një jetë të drejtë. Këto arsye kanë 
vlerë
 për shkollat, ashtu si për këdo tjetër.  Megjithatë, qëllimi i këtij
 artikulli është të paraqesë arsyet shtesë që prekin posaçërisht 
arsimin.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Software-i i lirë mund t’i kursejë shkollës para, por ky është 
vetëm një
@@ -223,7 +225,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.tr.html
===================================================================
RCS file: /web/www/www/education/edu-schools.tr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-schools.tr.html       6 Oct 2020 08:42:01 -0000       1.10
+++ education/edu-schools.tr.html       10 Nov 2020 17:37:30 -0000      1.11
@@ -42,12 +42,13 @@
 yazan <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Ana okulundan üniversiteye bütün okul düzeylerini içeren eğitim
 faaliyetleri, <a href="/education/education.html">sadece özgür yazılımı
 öğretmek gibi ahlaki bir göreve sahiptir.</a></p>
 
-<p class="italic">Tüm bilgisayar kullanıcıları kendilerine 
bilgisayarlarını denetleme
+<p>Tüm bilgisayar kullanıcıları kendilerine bilgisayarlarını denetleme
 özgürlüğünü sağlayan <a
 href="/philosophy/free-software-even-more-important.html">özgür yazılım
 konusunda ısrar etmelidir</a>. Özel mülkiyet yazılıma sahip bilgisayarlar,
@@ -56,6 +57,7 @@
 kurma özgürlüğü tanır, doğru bir yaşam olanağı sunar. Bu nedenler, 
herkes
 için olduğu gibi okullar için de geçerlidir. Bununla birlikte bu yazının
 amacı, eğitime özgü ek nedenleri sunmaktır.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Özgür yazılım okulların paralarının ceplerinde kalmasını sağlar, 
ancak bu
@@ -236,7 +238,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.uk.html
===================================================================
RCS file: /web/www/www/education/edu-schools.uk.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/edu-schools.uk.html       6 Oct 2020 08:42:01 -0000       1.15
+++ education/edu-schools.uk.html       10 Nov 2020 17:37:30 -0000      1.16
@@ -42,12 +42,13 @@
 <a href="http://www.stallman.org/";>Річард Столмен</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Освітні установи, в тому числі навчальні 
заклади усіх рівнів від дитсадочка
 до університету морально <a 
href="/education/education.html">зобов'язані
 викладати тільки вільні програми.</a> </p>
 
-<p class="italic">Усі користувачі комп'ютерів 
повинні <a
+<p>Усі користувачі комп'ютерів повинні <a
 href="/philosophy/free-software-even-more-important.html">наполягати 
на
 вільних програмах</a>: вони дають 
користувачам свободу контролювати свої
 комп'ютери&nbsp;&mdash; коли програма невільна, 
вона робить те, чого хоче її
@@ -56,6 +57,7 @@
 життя. Ці аргументи застосовні до 
навчальних закладів так само, як і до
 кожного з нас. Однак мета цієї 
статті&nbsp;&nbsp; подати додаткові докази,
 які застосовуються саме до сфери освіти. </p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>По-перше, вільні програми можуть 
зберегти навчального закладу гроші, але це
@@ -219,7 +221,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-schools.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-schools.zh-cn.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-schools.zh-cn.html    6 Oct 2020 08:42:01 -0000       1.4
+++ education/edu-schools.zh-cn.html    10 Nov 2020 17:37:30 -0000      1.5
@@ -41,11 +41,13 @@
 <a href="http://www.stallman.org/";>Richard Stallman</a> 著</address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 教育活动,包括从幼儿园到大学的各级学校,有道德职责<a 
href="/education/education.html">只教授自由软件。</a></p>
 
-<p class="italic">所有计算机用户都应该<a
+<p>所有计算机用户都应该<a
 
href="/philosophy/free-software-even-more-important.html">坚持使用自由软件</a>:它赋予用户控制å
…¶è®¡ç®—的自由&mdash;专属软件,执行的是其所有者或开发者
的意愿,而不是å…
¶ç”¨æˆ·çš„意愿。自由软件还赋予用户互相合作的自由,这就是诚信的生活。这些道理同æ
 ·é€‚用于学æ 
¡ã€‚不过,本文的目的是展示特别针对教育的一些道理。</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>自由软件可以为学校省钱,但这只是次要的好处。因
为学校和其他用户一æ 
·ï¼Œæœ‰è‡ªç”±å¤åˆ¶å’Œé‡æ–°å‘布自由软件,所以可以省钱;一个学æ
 ¡å¯ä»¥ç»™å…¶ä»–学校软件拷贝,这样所有学æ 
¡çš„计算机都可以安装自由软件而不必因此付费。</p>
@@ -144,7 +146,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.es.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.es.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- education/edu-software-gimp.es.html 1 Aug 2020 09:29:14 -0000       1.1
+++ education/edu-software-gimp.es.html 10 Nov 2020 17:37:30 -0000      1.2
@@ -82,7 +82,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>su
 trabajo</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>«Es un programa que utilizo para diferentes tareas: edición de fotos 
(mezcla
 de imágenes), dibujos (mis 'fragmentos digitales' con relación a mis
 'fragmentos reales' hechos en papel), enseñar a adolescentes, preparar
@@ -147,7 +147,7 @@
 <p>En el momento de escribir este artículo (marzo de 2012), Mani es estudiante
 de ciencias computacionales en Bangalore. Él dice:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> «En primer lugar quiero dar las gracias al movimiento del software libre,
 que me permitió empezar a aprender a utilizar GIMP. Fue mi primer logro en
 la vida, y vendí muchos cuadros en una conferencia de software
@@ -165,7 +165,7 @@
 
 <p>Richard Stallman comenta acerca de este caso:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>«Estoy más orgulloso de que GNU haya sido adoptado por los dalits de la
 India que de su uso en grandes corporaciones.»</p>
 </blockquote>
@@ -217,7 +217,7 @@
 <p>Isabel Saij explica por qué decidió liberarse de esa trampa usando 
software
 libre:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> «Con los programas privativos, el artista queda a merced de la compañía 
que
 desarrolla el software. A principios de 2003, yo solía usar LiveMotion para
 diseñar mis trabajos en 2D y 3D con piezas interactivas. Más adelante, ese
@@ -327,7 +327,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/08/01 09:29:14 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.fr.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- education/edu-software-gimp.fr.html 5 Oct 2020 13:13:19 -0000       1.49
+++ education/edu-software-gimp.fr.html 10 Nov 2020 17:37:30 -0000      1.50
@@ -85,7 +85,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>son
 travail</a> :</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>« C'est un programme que j'utilise pour différents travaux : la 
manipulation
 de photos (mixage d'images), le dessin (mes “fragments numériques”, qui 
font
 le pendant de mes “fragments réels” faits sur papier), l'enseignement à 
des
@@ -150,7 +150,7 @@
 <p>Au moment de la rédaction de cet article (mars 2012), Mani était 
étudiant en
 informatique à Bangalore. Voici ce qu'il dit :</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> « D'abord, je voudrais remercier le mouvement du logiciel libre qui m'a
 permis de débuter l'apprentissage de GIMP. Ce fut ma première réussite dans
 la vie, et j'ai vendu beaucoup de tableaux à un congrès sur le logiciel
@@ -168,7 +168,7 @@
 
 <p>Voici les commentaires de Richard Stallman sur ce cas :</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>« Je suis plus fier de l'adoption de GNU par les Indiens Dalits que de son
 utilisation par des entreprises célèbres. »</p>
 </blockquote>
@@ -224,7 +224,7 @@
 <p>Isabel Saij explique pourquoi elle a décidé de se libérer de ce piège en
 adoptant le logiciel libre :</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> « Avec les programmes privateurs, l'artiste est à la merci de la 
société qui
 développe le programme. Début 2003 j'utilisais LiveMotion pour créer mes
 œuvres numériques en 2D et 3D avec des éléments interactifs. Plus tard 
cette
@@ -346,7 +346,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:19 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.hr.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.hr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/edu-software-gimp.hr.html 29 Jun 2020 11:32:40 -0000      1.21
+++ education/edu-software-gimp.hr.html 10 Nov 2020 17:37:30 -0000      1.22
@@ -81,7 +81,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>svojem
 radu</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;To je program koji koristim za različite poslove: obradu fotografija
 (spajanje slika), crteža (mojih &lsquo;digitalnih isječaka&rsquo; s mojim
 &lsquo;stvarnim isječcima&rsquo; koji su napravljeni na papiru), pouku
@@ -143,7 +143,7 @@
 <p>U vrijeme pisanja ovog teksta (ožujak 2012.) Mani je student računalnih
 znanosti u Bangaloreu. On kaže:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;Prvo moram zahvaliti pokretu za slobodan softver koji mi je 
omogućio
 da započnem s učenjem GIMP-a. To je bilo moje prvo postignuće u životu i
 prodao sam mnogo slika na konferenciji o slobodnom softveru. Kasnije sam
@@ -159,7 +159,7 @@
 
 <p>Komentar Richarda Stallmana o ovom primjeru:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;Ponosniji sam na to Å¡to su GNU usvojili indijski Daliti, nego na to
 što ga koriste čuvene korporacije.&rdquo;</p>
 </blockquote>
@@ -206,7 +206,7 @@
 <p>Isabel Saij objašnjava zašto je odlučila osloboditi se iz te stupice
 prihvaćanjem slobodnog softvera:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;S vlasničkim programima umjetnik je na milosti kompanije koja 
razvija
 softver. Početkom 2003. godine koristila sam LiveMotion da bih dizajnirala
 svoja 2D i 3D djela s interaktivnim dijelovima. Kasnije te godine kompanija
@@ -316,7 +316,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Vrijeme zadnje izmjene:
 
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.it.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-software-gimp.it.html 29 Jun 2020 11:32:40 -0000      1.10
+++ education/edu-software-gimp.it.html 10 Nov 2020 17:37:30 -0000      1.11
@@ -81,7 +81,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>il
 suo lavoro</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;GIMP è un programma che uso per diversi lavori: fotoritocco
 (combinare più immagini), disegni (i miei &lsquo;frammenti digitali&rsquo;,
 la versione non cartacea dei miei &lsquo;frammenti reali&rsquo;),
@@ -145,7 +145,7 @@
 <p>Al momento della pubblicazione (marzo 2012), Mani studia informatica a
 Bangalore. Dice:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;Innanzitutto, vorrei ringraziare il movimento del software libero,
 senza il quale non avrei potuto imparare GIMP. È stato il mio primo
 successo, ho venduto molti dipinti ad una conferenza del software libero e
@@ -162,7 +162,7 @@
 
 <p>Il commento di Richard Stallman su questo caso:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;Provo più orgoglio per l'adozione di GNU da parte dei paria indiani
 che per il suo uso da parte di illustri aziende.&rdquo;</p>
 </blockquote>
@@ -212,7 +212,7 @@
 <p>Isabel Saij spiega perché ha deciso di liberarsi dalla trappola adottando 
il
 software libero:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;I programmi proprietari rendono l'artista succube delle società di
 sviluppo. All'inizio del 2003 ho usato LiveMotion per aggiungere
 interattività ai miei lavori digitali bi e tri-dimensionali. Più tardi,
@@ -327,7 +327,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.ja.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.ja.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- education/edu-software-gimp.ja.html 30 Jun 2020 22:29:55 -0000      1.17
+++ education/edu-software-gimp.ja.html 10 Nov 2020 17:37:30 -0000      1.18
@@ -66,7 +66,7 @@
 <p>フランスの芸術家イザベル・セイジ(Isabel Saij)さんは<a
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>彼女の作品</a>を作る際にどのようにGIMPを使っているかを説明しています。
 </p>
 
-<blockquote class="italic">
+<blockquote>
 <p>「わたしはこのプログラム
を複数の異なる用途に使っています。写真の処理(画像の合成)、ドローイング(ディジタルなç´
 æã‚’紙上の素材と組み合わせる)、10代の若者
に教えるための準備として動画像を用意するなど。別の言葉で言えば、わたしのお気にå
…¥ã‚Šã®ãƒ—ログラムの一つです。」</p>
 </blockquote>
 
@@ -107,13 +107,13 @@
 <!-- /#mani-movie -->
 <p>この文章
が書かれた当時(2012年3月)、マニはバンガロールでコンピュータ・サイエンスの学生でした。曰く:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> 
「最初に、GIMPを学習することをもたらしてくれた自由ソフトウェア運動に感謝の意を表したいと思います。これは人生の中でわたしの最初の成功であり、多くの絵を自由ソフトウェア・カンファレンスで売ることができました。その後、わたしは多くのカンファレンスで自分の作品を展示するようになりました。GIMPのおかげで、わたしの絵画の技能は世界へと広がりました。ご存知のとおり、わたしたちの才能は通常、世界から無視されています。このコミュニティにおけるわたしたちの目的は、ソフトウェアと知識をå
…
±æœ‰ã—、お互いに教えあい、自由ソフトウェアの倫理的価値を推進し、自由を軽んじる社会環境に対して、ソフトウェアの自由の重要性に気付かせ、コンピュータの知識によって貧è€
…に力を与えることです。わたしたã
 
¡ã¯ã¯ã“のモデルをまねてもらいたいと考えます。わたしたちは、この地域のほかのスラãƒ
 
街で、既に3つのコンピュータ・センタを稼働させています。」
 </p>
 </blockquote>
 
 
<p>リチャード・ストールマンのこの件についてのコメント:</p>
 
-<blockquote class="italic">
+<blockquote>
 
<p>「わたしはGNUが著名な企業ではなく、インドの不可触民に採用されたことに誇りを持っています。」</p>
 </blockquote>
 
@@ -130,7 +130,7 @@
 
 <p>イザベル・セイジさんは、どのようにしてこの罠
から逃れるために自由ソフトウェアを採用する決定をしたのかを説明します。</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> 「プロプライエタリなプログラム
によって、アーティストは、そのソフトウェア開発会社にすがることになります。2003年初é
 
­ã€ã‚ãŸã—はLiveMotionを使い、インタラクティブアートの2Dと3Dの作品をデザインしてました。同年その後、開発会社はその製品の中止を決定し、わたしはそのソフトウェアのサポートから取り残されました。自分のお金を費やし、時間を使って使い方を学習したソフトウェアでしたが。さらに、プロプライエタリなソフトウェア開発è€
…が新しい機能の追加を決定するたびに更新を購å…
¥ã—なければならず、しばしばそれは最新のプロプライエタリなオペレーティング・システãƒ
 ã 
けでしか動かないのです。まったく救いのない悪循環にはまり込んでいます。苛立たしいが、どうすることもできません。自由ソフトウェ
 
アであれば、コミュニティは常にコードにアクセスすることができるので、優れたプロジェクトは死ぬことがありません。誰かしらがそのソフトウェアの開発を継続することが可能です。」</p>
 </blockquote>
 
@@ -197,7 +197,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2020/06/30 22:29:55 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.pt-br.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-software-gimp.pt-br.html      29 Jun 2020 11:32:40 -0000      
1.9
+++ education/edu-software-gimp.pt-br.html      10 Nov 2020 17:37:30 -0000      
1.10
@@ -81,7 +81,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>seu
 trabalho</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>“É um programa que utilizo para diferentes trabalhos: manipulação de 
fotos
 (mistura de imagens), desenhos (meus ‘fragmentos digitais’ em relação aos
 meus ‘fragmentos reais’ feitos em papel), ensino para adolescentes,
@@ -144,7 +144,7 @@
 <p>No momento da escrita desse artigo (março de 2012), Mani é um estudante de
 Ciência da Computação em Bangalore. Ele diz:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> “Primeiro eu preciso dizer obrigado ao movimento software livre, o qual 
me
 permitiu começar a aprender o GIMP. Foi minha primeira conquista na vida, e
 eu vendi muitas pinturas em uma conferência de Software Livre. Mais tarde,
@@ -161,7 +161,7 @@
 
 <p>Comentário do Richard Stallman neste caso:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>“Eu estou mais orgulhoso que o GNU tenha sido adotado pelos dalits 
indianos,
 do que de seu uso por corporações famosas.”</p>
 </blockquote>
@@ -213,7 +213,7 @@
 <p>Isabel Saij explica por que ela decidiu se libertar da armadilha adotando o
 Software Livre:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> “Com programas proprietários, o artista fica à mercê da empresa de
 desenvolvimento de software. No início de 2003, usei o LiveMotion para
 projetar meus trabalhos digitais em 2D e 3D com peças interativas. Mais
@@ -326,7 +326,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.tr.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.tr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-software-gimp.tr.html 29 Jun 2020 11:32:40 -0000      1.5
+++ education/edu-software-gimp.tr.html 10 Nov 2020 17:37:30 -0000      1.6
@@ -81,7 +81,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>çalışması</a>
 için GIMP'ı nasıl kullandığını anlatıyor:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;Farklı işler için kullandığım bir program: Fotoğraf işleme
 (görüntüleri bir araya getirme), çizimler (kâğıt üzerine yapılan
 &lsquo;gerçek parçalar&rsquo;ım ile ilgili &lsquo;dijital
@@ -144,7 +144,7 @@
 <p>Bu yazı yazılırken (Mart 2012) Mani, Bangalore'de Bilgisayar Bilimi
 öğrencisiydi. Şöyle diyor:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;Öncelikle Özgür Yazılım hareketi sayesinde şunu söylemeliyim 
ki GIMP
 öğrenmeye başlamama yol açtı. Hayattaki ilk başarımdı ve Özgür 
Yazılım
 konferansında birçok resim sattım. Daha sonra çalışmalarımı birçok
@@ -160,7 +160,7 @@
 
 <p>Richard Stallman'ın bu durum ile ilgili yorumu:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;GNU'nun Hint Dalitler tarafından benimsenmesinden, ünlü şirketler
 tarafından kullanılmasından daha fazla gurur duyuyorum.&rdquo;</p>
 </blockquote>
@@ -207,7 +207,7 @@
 <p>Isabel Saij, neden Özgür Yazılım'ı benimseyerek tuzaktan kurtulmaya 
karar
 verdiğini açıklıyor:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;Özel mülk programlarla sanatçı, yazılım geliştirme 
şirketinin
 insafındadır. 2003 yılının başlarında etkileşimli parçalarla dijital 
2B ve
 3B çalışmalarımı tasarlamak için LiveMotion'u kullandım. O yılın 
ilerleyen
@@ -326,7 +326,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.uk.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.uk.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-software-gimp.uk.html 29 Jun 2020 11:32:40 -0000      1.8
+++ education/edu-software-gimp.uk.html 10 Nov 2020 17:37:30 -0000      1.9
@@ -80,7 +80,7 @@
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>своєї
 роботи</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;Цю програму я використовую для різних
 робіт: редагування світлин
 (змішування зображень разом), малювання 
(мої &lsquo;цифрові фрагменти&rsquo;
 щодо мого &lsquo;реального фрагменти&rsquo; 
зроблено на папері), навчання
@@ -144,7 +144,7 @@
 <p>На час написання (березень 2012) Мані був 
студентом на комп'ютерних науках у
 Бангалорі. Він сказав:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;По-перше, я повинен подякувати руху 
за вільне програмне
 забезпечення. Він дозволив мені почати 
вивчення GIMP. Це було моє перше
 досягнення в житті, і я продав безліч 
картин на конференції із вільного
@@ -161,7 +161,7 @@
 
 <p>Коментар Річарда Столмена про цей 
випадок:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;Я більше пишаюся тим, що GNU був 
прийнятим індійськими далітами ніж
 його використанням відомими 
корпораціями.&rdquo;</p>
 </blockquote>
@@ -211,7 +211,7 @@
 <p>Ізабель Saij пояснює, чому вона вирішила 
вирватися з пастки, прийнявши
 вільне програмне забезпечення:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;Із власницькими програмами художник 
відданий на милість програми
 розробника програмного забезпечення. На 
початку 2003 року я використовував
 LiveMotion у дизайні моїх цифрових 2D і 3D робіт 
із інтерактивними
@@ -324,7 +324,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/edu-software-gimp.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.zh-cn.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-software-gimp.zh-cn.html      29 Jun 2020 11:32:40 -0000      
1.5
+++ education/edu-software-gimp.zh-cn.html      10 Nov 2020 17:37:30 -0000      
1.6
@@ -66,7 +66,7 @@
 <p>法国艺术家Isabel Saij描述她如何使用GIMP完成了<a
 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>她的作品</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;这是一个我在不同作品中都使用的程序:ç…
§ç‰‡å¤„理(将图片混合在一起)、绘画(和我用于画纸的‘实é™
…画框’相å…
³è”的‘数字画框’)、为青少年讲课、为视频准备图片等等)。换句话说,这是我最爱的程序之一。&rdquo;</p>
 </blockquote>
 
@@ -106,13 +106,13 @@
 <!-- /#mani-movie -->
 <p>此文撰写时(2012年3月)Mani是班加
罗尔的一名计算机科学学生。他说道:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;首å…
ˆï¼Œæˆ‘要对自由软件运动说声谢谢,是它让我能够开始学习
GIMP。这是我生命中的第一个成就,并且我在一次自由软件会议上卖出了许多绘画。后来,我开始在很多会议上展示我的作品。å›
 ä¸ºGIMP,我的绘画技艺得以展现给世界。如你
所知,我们的才能通常为世界所忽略。我们在社区的目æ 
‡æ˜¯ï¼šåˆ†äº«è½¯ä»¶å’ŒçŸ¥è¯†ï¼Œäº’相学习
;弘扬自由软件的道德价值并在这个被边缘化的社会环境中提升软件自由之重要性的认知度;用计算机知识赋予穷人力量。我们要复制我们的æ
 ·æ¿ï¼Œåœ¨æ­¤åœ°åŒºçš„å…
¶ä»–贫民区,我们已经在运行3所计算中心。&rdquo; </p>
 </blockquote>
 
 <p>Richard Stallman对此案例的评价:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;比之GNU被著名的大å…
¬å¸æ‰€ç”¨ï¼Œæˆ‘更为之被印度达利人<sup><a
 href="#TransNote1">1</a></sup>所用而自豪。&rdquo;</p>
 </blockquote>
@@ -130,7 +130,7 @@
 
 <p>Isabel Saij解释了为什么她决定冲ç 
´è—©ç¯±ï¼Œæ‹¥æŠ±è‡ªç”±è½¯ä»¶ï¼š</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;使用专有软件,艺术家们对软件开发商无
能为力。在2003年初,我使用LiveMotion来设计2D和3D的交互式艺术作品。当年晚些时候,该å
…¬å¸å†³å®šåœæ­¢è¯¥è½¯ä»¶ï¼Œå› 
此我就被撇下:我花费了时间和金钱学习
使用该软件,但是现在没有了技术支持。更有甚者,无
论何时,只要专有软件开发者决定引入新的功能,你
就不得不花钱购买通常只会运行在最新的专有操作系统上的升级版。这æ
 ·ï¼Œä½ å°±å®Œå…¨æ— åŠ©åœ°é™·å…¥äº†é‚ªæ¶çš„循环之中。令人沮丧但又无
能为力。使用自由软件,社区拥有代ç 
ï¼Œå¥½çš„项目永远不会没落。总有人会继续开发该软件。&rdquo;</p>
 </blockquote>
 
@@ -199,7 +199,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/remote-education-children-freedom-privacy-at-stake.es.html
===================================================================
RCS file: 
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/remote-education-children-freedom-privacy-at-stake.es.html        
6 Oct 2020 08:42:01 -0000       1.4
+++ education/remote-education-children-freedom-privacy-at-stake.es.html        
10 Nov 2020 17:37:30 -0000      1.5
@@ -269,11 +269,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Las fotos son cortesía de Javier Sepúlveda y están bajo licencia <a
 rel="license"
 href="https://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
 Commons Reconocimiento-SinObraDerivada 4.0 Internacional</a>.</p>
+</blockquote>
 </div>
 
 <div class="translators-notes">
@@ -344,7 +346,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/remote-education-children-freedom-privacy-at-stake.fr.html
===================================================================
RCS file: 
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.fr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/remote-education-children-freedom-privacy-at-stake.fr.html        
6 Oct 2020 08:42:01 -0000       1.6
+++ education/remote-education-children-freedom-privacy-at-stake.fr.html        
10 Nov 2020 17:37:30 -0000      1.7
@@ -282,11 +282,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Photographies avec l'aimable autorisation de Javier Sepúlveda, sous licence
 <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
 attribution, pas de modification, 4.0 internationale</a>.</p>
+</blockquote>
 </div>
 
 <div class="translators-notes">
@@ -363,7 +365,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/remote-education-children-freedom-privacy-at-stake.tr.html
===================================================================
RCS file: 
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.tr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/remote-education-children-freedom-privacy-at-stake.tr.html        
6 Oct 2020 08:42:01 -0000       1.5
+++ education/remote-education-children-freedom-privacy-at-stake.tr.html        
10 Nov 2020 17:37:30 -0000      1.6
@@ -259,11 +259,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Fotoğraflar Javier Sepúlveda'nın izniyle kullanılmıştır. <a 
rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.tr";> Creative
 Commons Alıntı-Türetilemez 4.0 Uluslararası Lisansı</a> altında
 lisanslanmıştır.</p>
+</blockquote>
 </div>
 
 <div class="translators-notes">
@@ -347,7 +349,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/remote-education-children-freedom-privacy-at-stake.zh-cn.html
===================================================================
RCS file: 
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.zh-cn.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/remote-education-children-freedom-privacy-at-stake.zh-cn.html     
6 Oct 2020 08:42:01 -0000       1.3
+++ education/remote-education-children-freedom-privacy-at-stake.zh-cn.html     
10 Nov 2020 17:37:30 -0000      1.4
@@ -176,10 +176,12 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 照片致意 Javier Sepúlveda。它们使用 <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
 Attribution-NoDerivatives 4.0 International License</a> 授权。</p>
+</blockquote>
 </div>
 
 <div class="translators-notes">
@@ -250,7 +252,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
 
 <!-- timestamp end -->
 </p>

Index: education/po/edu-cases-argentina-ecen.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.de-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-cases-argentina-ecen.de-en.html    31 May 2020 05:35:14 
-0000      1.33
+++ education/po/edu-cases-argentina-ecen.de-en.html    10 Nov 2020 17:37:31 
-0000      1.34
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.de.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- education/po/edu-cases-argentina-ecen.de.po 31 May 2020 05:01:39 -0000      
1.40
+++ education/po/edu-cases-argentina-ecen.de.po 10 Nov 2020 17:37:31 -0000      
1.41
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: edu-cases-argentinia-ecen.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-09-13 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -67,7 +67,7 @@
 "<span xml:lang=\"es\" lang=\"es\">Escuela Cristiana Evangélica de Neuquén "
 "(ECEN)</span>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -377,7 +377,7 @@
 "verbreiten wir was wir gelernt haben, um anderen Bildungseinrichtungen zu "
 "helfen."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.el-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.el-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.el-en.html    31 May 2020 05:35:14 
-0000      1.4
+++ education/po/edu-cases-argentina-ecen.el-en.html    10 Nov 2020 17:37:31 
-0000      1.5
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.el.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-argentina-ecen.el.po 31 May 2020 05:01:13 -0000      
1.7
+++ education/po/edu-cases-argentina-ecen.el.po 10 Nov 2020 17:37:31 -0000      
1.8
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2015-04-28 10:15+0200\n"
 "Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
 "Language-Team: www-el <www-el-translators@gnu.org>\n"
@@ -67,7 +67,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Χριστιανικό Ευαγγελικό Σχολείο του 
Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -390,7 +390,7 @@
 "διαδίδουμε αυτά που μάθαμε, ούτως ώστε να 
βοηθήσουμε άλλες εκπαιδευτικές "
 "κοινότητες."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.es-en.html    31 May 2020 05:35:14 
-0000      1.6
+++ education/po/edu-cases-argentina-ecen.es-en.html    10 Nov 2020 17:37:31 
-0000      1.7
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-argentina-ecen.es.po 31 May 2020 05:00:59 -0000      
1.15
+++ education/po/edu-cases-argentina-ecen.es.po 10 Nov 2020 17:37:31 -0000      
1.16
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-09-14 11:23+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -67,7 +67,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -380,7 +380,7 @@
 "agradable. Ahora difundimos lo que hemos aprendido con el fin de ayudar a "
 "otras comunidades educativas."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.fr-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- education/po/edu-cases-argentina-ecen.fr-en.html    31 May 2020 05:35:14 
-0000      1.29
+++ education/po/edu-cases-argentina-ecen.fr-en.html    10 Nov 2020 17:37:31 
-0000      1.30
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.fr.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/po/edu-cases-argentina-ecen.fr.po 5 Oct 2020 13:13:20 -0000       
1.32
+++ education/po/edu-cases-argentina-ecen.fr.po 10 Nov 2020 17:37:31 -0000      
1.33
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-11-03 12:59+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -63,7 +63,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -376,7 +376,7 @@
 "à conduire ce processus. Maintenant, nous diffusons ce que nous avons appris 
"
 "afin d'aider les autres communautés éducatives."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.hr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.hr-en.html    31 May 2020 05:35:14 
-0000      1.6
+++ education/po/edu-cases-argentina-ecen.hr-en.html    10 Nov 2020 17:37:31 
-0000      1.7
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.hr.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- education/po/edu-cases-argentina-ecen.hr.po 31 May 2020 05:02:15 -0000      
1.16
+++ education/po/edu-cases-argentina-ecen.hr.po 10 Nov 2020 17:37:31 -0000      
1.17
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2014-04-10 20:34+0100\n"
 "Last-Translator: Martina Bebek <martinaporec@pulsir.eu>\n"
 "Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evang&eacute;lica de Neuqu&eacute;n (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -366,7 +366,7 @@
 "Premda je zahtijevao predanost i ustrajnost, proces je bio ugodan. Sada "
 "širimo ono što smo naučili kako bismo pomogli drugim obrazovnim 
zajednicama."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.it-en.html    31 May 2020 05:35:14 
-0000      1.4
+++ education/po/edu-cases-argentina-ecen.it-en.html    10 Nov 2020 17:37:31 
-0000      1.5
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.it.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-argentina-ecen.it.po 31 May 2020 05:02:41 -0000      
1.7
+++ education/po/edu-cases-argentina-ecen.it.po 10 Nov 2020 17:37:31 -0000      
1.8
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-10-01 09:46+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -64,7 +64,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Scuola Cristiana Evangelica di Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -376,7 +376,7 @@
 "piacevole. Adesso diffondiamo quello che abbiamo imparato per aiutare altre "
 "comunità educative."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ja-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-argentina-ecen.ja-en.html    31 May 2020 05:35:14 
-0000      1.23
+++ education/po/edu-cases-argentina-ecen.ja-en.html    10 Nov 2020 17:37:31 
-0000      1.24
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ja.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- education/po/edu-cases-argentina-ecen.ja.po 31 Jul 2020 02:39:08 -0000      
1.25
+++ education/po/edu-cases-argentina-ecen.ja.po 10 Nov 2020 17:37:31 -0000      
1.26
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-07-31 11:19+0900\n"
 "Last-Translator: Katsuya TANAKA <katsuya@member.fsf.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -62,7 +62,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -345,7 +345,7 @@
 "献身と忍耐が必
要でしたが、作業は楽しいものでした。現在、われわれの経験を広å
 ±"
 "し、他の教育グループを支援しようとしています。"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.lt-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.lt-en.html    31 May 2020 05:35:14 
-0000      1.4
+++ education/po/edu-cases-argentina-ecen.lt-en.html    10 Nov 2020 17:37:31 
-0000      1.5
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.lt.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-argentina-ecen.lt.po 31 May 2020 05:03:06 -0000      
1.5
+++ education/po/edu-cases-argentina-ecen.lt.po 10 Nov 2020 17:37:31 -0000      
1.6
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-15 02:36+0200\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -363,7 +363,7 @@
 "mes skleidžiame tai, ką mes išmokome, siekdami padėti kitoms 
švietėjiškoms "
 "bendruomenėms."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.pot
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- education/po/edu-cases-argentina-ecen.pot   31 May 2020 05:35:14 -0000      
1.17
+++ education/po/edu-cases-argentina-ecen.pot   10 Nov 2020 17:37:31 -0000      
1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -57,7 +57,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -284,7 +284,7 @@
 "communities."
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.pt-br-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.pt-br-en.html 31 May 2020 05:35:14 
-0000      1.2
+++ education/po/edu-cases-argentina-ecen.pt-br-en.html 10 Nov 2020 17:37:31 
-0000      1.3
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.pt-br.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-argentina-ecen.pt-br.po      31 May 2020 05:03:35 
-0000      1.11
+++ education/po/edu-cases-argentina-ecen.pt-br.po      10 Nov 2020 17:37:31 
-0000      1.12
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-08-14 05:58-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -369,7 +369,7 @@
 "Agora, nós disseminamos o que aprendemos para ajudar outras comunidades "
 "educacionais."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.ru-en.html    31 May 2020 05:35:14 
-0000      1.4
+++ education/po/edu-cases-argentina-ecen.ru-en.html    10 Nov 2020 17:37:31 
-0000      1.5
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ru.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-argentina-ecen.ru.po 31 May 2020 05:03:48 -0000      
1.7
+++ education/po/edu-cases-argentina-ecen.ru.po 10 Nov 2020 17:37:31 -0000      
1.8
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-02-16 17:51+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -65,7 +65,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Христианская евангелистская школа 
Неукена (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -365,7 +365,7 @@
 "самоотверженности и упорства, процесс был 
приятным. Теперь мы делимся "
 "приобретенным опытом, чтобы помочь другим 
образовательным сообществам."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.tr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.tr-en.html    31 May 2020 05:35:14 
-0000      1.2
+++ education/po/edu-cases-argentina-ecen.tr-en.html    10 Nov 2020 17:37:31 
-0000      1.3
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.tr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.tr.po 31 May 2020 07:06:53 -0000      
1.6
+++ education/po/edu-cases-argentina-ecen.tr.po 10 Nov 2020 17:37:31 -0000      
1.7
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-31 08:49+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -354,7 +354,7 @@
 "Özveri ve azim gerektirse de süreç keyifliydi. Şimdi diğer eğitim "
 "topluluklarına yardımcı olmak için öğrendiklerimizi yayıyoruz."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.uk-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.uk-en.html    31 May 2020 05:35:14 
-0000      1.6
+++ education/po/edu-cases-argentina-ecen.uk-en.html    10 Nov 2020 17:37:31 
-0000      1.7
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.uk.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-cases-argentina-ecen.uk.po 31 May 2020 05:35:14 -0000      
1.13
+++ education/po/edu-cases-argentina-ecen.uk.po 10 Nov 2020 17:37:31 -0000      
1.14
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2014-04-03 18:03+0300\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <www-uk-translations@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Християнська євангельська школа 
Неукена (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -362,7 +362,7 @@
 "добре. Тепер ми розповідаємо те, що 
дізналися, аби допомогти іншим "
 "навчальним закладам."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-argentina-ecen.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.zh-cn-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.zh-cn-en.html 31 May 2020 05:35:14 
-0000      1.2
+++ education/po/edu-cases-argentina-ecen.zh-cn-en.html 10 Nov 2020 17:37:31 
-0000      1.3
@@ -40,11 +40,13 @@
 <div id="last-div" class="reduced-width">
 <h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was extracted from a report submitted to us
 by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played 
 a key role in raising Free Software awareness and ultimately getting 
 the school to migrate.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -174,9 +176,11 @@
 communities.</p>
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We would like to express our appreciation for the excellent work done to 
 all the people involved in the migration effort.</p>
+</blockquote>
 </div>
 <!--#include virtual="/education/education-menu.html" -->
 <!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-argentina-ecen.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.zh-cn.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.zh-cn.po      31 May 2020 05:04:30 
-0000      1.2
+++ education/po/edu-cases-argentina-ecen.zh-cn.po      10 Nov 2020 17:37:31 
-0000      1.3
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-12-02 09:39+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn.translators@gnu.org>\n"
@@ -61,7 +61,7 @@
 msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was extracted from a report submitted to us by "
 "ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -329,7 +329,7 @@
 
"虽然它需要奉献和坚韧,整个过程还是令人愉悦的。现在我们ä¼
 æ’­æˆ‘们所学,以帮助其"
 "他教育社区。"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We would like to express our appreciation for the excellent work done to all "
 "the people involved in the migration effort."

Index: education/po/edu-cases-india-ambedkar.ar-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ar-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-cases-india-ambedkar.ar-en.html    31 May 2020 05:35:15 
-0000      1.3
+++ education/po/edu-cases-india-ambedkar.ar-en.html    10 Nov 2020 17:37:31 
-0000      1.4
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.ar.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ar.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-ambedkar.ar.po 31 May 2020 05:00:58 -0000      
1.7
+++ education/po/edu-cases-india-ambedkar.ar.po 10 Nov 2020 17:37:31 -0000      
1.8
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-05-16 01:15+0300\n"
 "Last-Translator: Mohammed Isam <mohammed_isam1984@yahoo.com>\n"
 "Language-Team: Arabic <www-ar-translators@gnu.org>\n"
@@ -67,7 +67,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "مركز أمبيدكار اﻻجتماعي للحوسبة (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -236,7 +236,7 @@
 "هؤﻻء الطلاب يقولون أن المهارات التي يتعلم
ونها في المركز لها بالغ اﻷثر في "
 "مساعدتهم على متابعة مقرراتهم المدرسية 
والنجاح فيها بصورة مرضية."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.de-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- education/po/edu-cases-india-ambedkar.de-en.html    31 May 2020 05:35:15 
-0000      1.41
+++ education/po/edu-cases-india-ambedkar.de-en.html    10 Nov 2020 17:37:31 
-0000      1.42
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.de.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- education/po/edu-cases-india-ambedkar.de.po 31 May 2020 05:01:39 -0000      
1.50
+++ education/po/edu-cases-india-ambedkar.de.po 10 Nov 2020 17:37:31 -0000      
1.51
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-09-13 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -65,7 +65,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Ambedkar Community Computing Center (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -242,7 +242,7 @@
 "unschätzbarer Hilfe sind, um den Kursen erfolgreich zu folgen und "
 "abzuschließen."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.el-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.el-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-ambedkar.el-en.html    31 May 2020 05:35:15 
-0000      1.6
+++ education/po/edu-cases-india-ambedkar.el-en.html    10 Nov 2020 17:37:31 
-0000      1.7
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.el.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-india-ambedkar.el.po 31 May 2020 05:01:13 -0000      
1.11
+++ education/po/edu-cases-india-ambedkar.el.po 10 Nov 2020 17:37:31 -0000      
1.12
@@ -11,7 +11,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2015-04-27 22:02+0200\n"
 "Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
 "Language-Team: www-el <www-el-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Κέντρο Πληροφορικής της Κοινότητας 
Ambedkar (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -246,7 +246,7 @@
 "στο Κέντρο είναι μια ανεκτίμητη βοήθεια 
γι αυτά προκειμένου να μπορέσουν να "
 "παρακολουθήσουν και να περάσουν με επιτυ
χία κι εκείνα τα μαθήματα."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.es-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-cases-india-ambedkar.es-en.html    31 May 2020 05:35:15 
-0000      1.13
+++ education/po/edu-cases-india-ambedkar.es-en.html    10 Nov 2020 17:37:31 
-0000      1.14
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.es.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/po/edu-cases-india-ambedkar.es.po 31 May 2020 05:00:59 -0000      
1.21
+++ education/po/edu-cases-india-ambedkar.es.po 10 Nov 2020 17:37:31 -0000      
1.22
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-08-30 10:23+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -67,7 +67,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Centro de Computación Comunitario de Ambedkar (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -242,7 +242,7 @@
 "el Centro son de inestimable ayuda para seguir esos cursos y superarlos con "
 "éxito."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.fr-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-cases-india-ambedkar.fr-en.html    31 May 2020 05:35:15 
-0000      1.33
+++ education/po/edu-cases-india-ambedkar.fr-en.html    10 Nov 2020 17:37:31 
-0000      1.34
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.fr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-cases-india-ambedkar.fr.po 5 Oct 2020 13:13:20 -0000       
1.33
+++ education/po/edu-cases-india-ambedkar.fr.po 10 Nov 2020 17:37:31 -0000      
1.34
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-11-03 12:59+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -65,7 +65,7 @@
 "Centre informatique communautaire Ambedkar (<abbr title=\"Ambedkar Community "
 "Computing Center\">AC3</abbr>)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -241,7 +241,7 @@
 "disent-ils, leur sont d'une aide inestimable pour suivre ces cours avec "
 "succès."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.hr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-india-ambedkar.hr-en.html    31 May 2020 05:35:15 
-0000      1.11
+++ education/po/edu-cases-india-ambedkar.hr-en.html    10 Nov 2020 17:37:32 
-0000      1.12
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.hr.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/po/edu-cases-india-ambedkar.hr.po 31 May 2020 05:02:15 -0000      
1.18
+++ education/po/edu-cases-india-ambedkar.hr.po 10 Nov 2020 17:37:32 -0000      
1.19
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2014-03-06 22:11+0100\n"
 "Last-Translator: Martina Bebek <martinaporec@pulsir.eu>\n"
 "Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Računalni centar zajednice Ambedkar (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -238,7 +238,7 @@
 "tečajeve u školi. Kažu da su im vještine koje su stekli u centru od "
 "neprocjenjive pomoći u pohađanju i uspješnom polaganju tih tečajeva."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.it-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-india-ambedkar.it-en.html    31 May 2020 05:35:15 
-0000      1.23
+++ education/po/edu-cases-india-ambedkar.it-en.html    10 Nov 2020 17:37:32 
-0000      1.24
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.it.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/po/edu-cases-india-ambedkar.it.po 31 May 2020 05:02:41 -0000      
1.30
+++ education/po/edu-cases-india-ambedkar.it.po 10 Nov 2020 17:37:32 -0000      
1.31
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-02-02 19:27+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -64,7 +64,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Centro comunitario di informatica Ambedkar (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -239,7 +239,7 @@
 "imparato al centro sono per loro di inestimabile aiuto per seguire e "
 "superare questi corsi con successo. "
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ja-en.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- education/po/edu-cases-india-ambedkar.ja-en.html    31 May 2020 05:35:15 
-0000      1.27
+++ education/po/edu-cases-india-ambedkar.ja-en.html    10 Nov 2020 17:37:32 
-0000      1.28
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- education/po/edu-cases-india-ambedkar.ja.po 31 Jul 2020 02:39:08 -0000      
1.35
+++ education/po/edu-cases-india-ambedkar.ja.po 10 Nov 2020 17:37:32 -0000      
1.36
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-07-31 11:22+0900\n"
 "Last-Translator: Katsuya TANAKA <katsuya@member.fsf.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -62,7 +62,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Ambedkar Community Computing Center (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -230,7 +230,7 @@
 
"供もいます。そうした子供たちは、センターで習うスキルが学æ
 ¡ã§ã®æŽˆæ¥­ã‚’こなすの"
 "にとても役立っているのだと言っています。"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.lt-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-india-ambedkar.lt-en.html    31 May 2020 05:35:15 
-0000      1.5
+++ education/po/edu-cases-india-ambedkar.lt-en.html    10 Nov 2020 17:37:32 
-0000      1.6
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.lt.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/po/edu-cases-india-ambedkar.lt.po 31 May 2020 05:03:06 -0000      
1.9
+++ education/po/edu-cases-india-ambedkar.lt.po 10 Nov 2020 17:37:32 -0000      
1.10
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-15 02:31+0200\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Ambedkar bendruomenės kompiuterijos centras (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -239,7 +239,7 @@
 "kursus mokykloje. Jie praneša, kad įgūdžiai, kuriuos jie išmoksta 
Centre, "
 "jiems yra neįkainojama pagalba sekti ir išlaikyti tuos kursus sėkmingai."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.pot
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.pot,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- education/po/edu-cases-india-ambedkar.pot   31 May 2020 05:35:15 -0000      
1.22
+++ education/po/edu-cases-india-ambedkar.pot   10 Nov 2020 17:37:32 -0000      
1.23
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -57,7 +57,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -184,7 +184,7 @@
 "invaluable help for them to follow and pass those courses successfully."
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.pt-br-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-ambedkar.pt-br-en.html 31 May 2020 05:35:15 
-0000      1.6
+++ education/po/edu-cases-india-ambedkar.pt-br-en.html 10 Nov 2020 17:37:32 
-0000      1.7
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.pt-br.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-ambedkar.pt-br.po      31 May 2020 05:03:35 
-0000      1.12
+++ education/po/edu-cases-india-ambedkar.pt-br.po      10 Nov 2020 17:37:32 
-0000      1.13
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-08-26 13:32-0200\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Centro de Computação Comunitária de Ambedkar (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -240,7 +240,7 @@
 "Centro são de grande ajuda para acompanhar e passar naqueles cursos com "
 "sucesso."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ru-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/po/edu-cases-india-ambedkar.ru-en.html    31 May 2020 05:35:15 
-0000      1.9
+++ education/po/edu-cases-india-ambedkar.ru-en.html    10 Nov 2020 17:37:32 
-0000      1.10
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-ambedkar.ru.po 31 May 2020 05:03:48 -0000      
1.12
+++ education/po/edu-cases-india-ambedkar.ru.po 10 Nov 2020 17:37:32 -0000      
1.13
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-08-26 17:34+0000\n"
 "Last-Translator: Andrei Fediukov <redandrei@fedoraproject.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Амбедкарский общественный 
вычислительный центр (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -239,7 +239,7 @@
 "оказывают им неоценимую помощь, когда они 
проходят эти курсы, а затем "
 "успешно сдают экзамены."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.tr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-india-ambedkar.tr-en.html    31 May 2020 05:35:15 
-0000      1.2
+++ education/po/edu-cases-india-ambedkar.tr-en.html    10 Nov 2020 17:37:33 
-0000      1.3
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.tr.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-ambedkar.tr.po 31 May 2020 07:06:53 -0000      
1.7
+++ education/po/edu-cases-india-ambedkar.tr.po 10 Nov 2020 17:37:34 -0000      
1.8
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-31 08:49+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -64,7 +64,7 @@
 "Ambedkar Topluluğu Bilişim Merkezi (<abbr title=\"Ambedkar Community "
 "Computing Center\">AC3</abbr>)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -236,7 +236,7 @@
 "alıyorlar. Merkez'de öğrendikleri becerilerin, bu dersleri başarılı bir 
"
 "şekilde takip etmeleri ve geçmeleri için çok değerli olduğunu 
söylüyorlar."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.uk-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/po/edu-cases-india-ambedkar.uk-en.html    31 May 2020 05:35:15 
-0000      1.8
+++ education/po/edu-cases-india-ambedkar.uk-en.html    10 Nov 2020 17:37:34 
-0000      1.9
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.uk.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- education/po/edu-cases-india-ambedkar.uk.po 31 May 2020 05:04:16 -0000      
1.16
+++ education/po/edu-cases-india-ambedkar.uk.po 10 Nov 2020 17:37:34 -0000      
1.17
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2014-04-03 18:03+0300\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <www-uk-translations@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Амбедкарський громадський 
обчислювальний центр (AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -240,7 +240,7 @@
 "курси в школі. Вони кажуть, що навички, 
набуті ними в центрі, надали "
 "неоціненну допомогу у відвідуванні та 
успішного складання цих курсів."
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-ambedkar.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.zh-cn-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-ambedkar.zh-cn-en.html 31 May 2020 05:35:15 
-0000      1.6
+++ education/po/edu-cases-india-ambedkar.zh-cn-en.html 10 Nov 2020 17:37:34 
-0000      1.7
@@ -40,9 +40,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Ambedkar Community Computing Center (AC3)</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following information was submitted to us by the group of volunteers 
 working at the Center.</p>
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -121,12 +123,14 @@
 successfully.</p> 
 </div> 
 
-<p class="italic">
+<blockquote>
+<p>
 We are informed that the outstanding effort of Free Software 
 volunteers is expanding in these deprived areas of the city, with
 remarkable results. If you would like to contribute or donate laptops to
 this group, please contact us at
 <a href="mailto:education@gnu.org";>&lt;education@gnu.org&gt;</a>.</p>
+</blockquote>
 
 <div class="infobox">
 <p>The image on this page is licensed under the CC-BY-SA, 
@@ -174,7 +178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-ambedkar.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.zh-cn.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/po/edu-cases-india-ambedkar.zh-cn.po      31 May 2020 05:04:30 
-0000      1.8
+++ education/po/edu-cases-india-ambedkar.zh-cn.po      10 Nov 2020 17:37:35 
-0000      1.9
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-08-30 20:47+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -60,7 +60,7 @@
 msgid "Ambedkar Community Computing Center (AC3)"
 msgstr "Ambedkar社区计算中心(AC3)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following information was submitted to us by the group of volunteers "
 "working at the Center."
@@ -213,7 +213,7 @@
 "其中一些孩子在学校也参加
了计算课程。他们汇报说在中心学到的技术非常有价值,帮"
 "助他们学习并成功通过学校的课程。"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "We are informed that the outstanding effort of Free Software volunteers is "
 "expanding in these deprived areas of the city, with remarkable results. If "

Index: education/po/edu-cases-india-irimpanam.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.de-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- education/po/edu-cases-india-irimpanam.de-en.html   25 Jul 2020 20:00:28 
-0000      1.48
+++ education/po/edu-cases-india-irimpanam.de-en.html   10 Nov 2020 17:37:36 
-0000      1.49
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- education/po/edu-cases-india-irimpanam.de.po        25 Jul 2020 20:00:28 
-0000      1.70
+++ education/po/edu-cases-india-irimpanam.de.po        10 Nov 2020 17:37:36 
-0000      1.71
@@ -9,7 +9,7 @@
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-10-25 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Vocational Higher Secondary School Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.el-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.el-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-irimpanam.el-en.html   25 Jul 2020 20:00:28 
-0000      1.7
+++ education/po/edu-cases-india-irimpanam.el-en.html   10 Nov 2020 17:37:36 
-0000      1.8
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.el.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-india-irimpanam.el.po        25 Jul 2020 20:00:28 
-0000      1.23
+++ education/po/edu-cases-india-irimpanam.el.po        10 Nov 2020 17:37:36 
-0000      1.24
@@ -11,7 +11,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2015-04-28 21:45+0200\n"
 "Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
 "Language-Team: www-el <www-el-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Ανώτερο Δευτεροβάθμιο Επαγγελματικό 
Σχολείο του Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.es-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- education/po/edu-cases-india-irimpanam.es-en.html   21 Jun 2020 10:58:50 
-0000      1.34
+++ education/po/edu-cases-india-irimpanam.es-en.html   10 Nov 2020 17:37:36 
-0000      1.35
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/21 10:58:50 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.es.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/po/edu-cases-india-irimpanam.es.po        21 Jun 2020 10:58:50 
-0000      1.39
+++ education/po/edu-cases-india-irimpanam.es.po        10 Nov 2020 17:37:36 
-0000      1.40
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-21 03:13-0500\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -68,7 +68,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Escuela Vocacional de Secundaria Superior Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.fr-en.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- education/po/edu-cases-india-irimpanam.fr-en.html   21 Jun 2020 07:29:06 
-0000      1.50
+++ education/po/edu-cases-india-irimpanam.fr-en.html   10 Nov 2020 17:37:36 
-0000      1.51
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/21 07:29:06 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- education/po/edu-cases-india-irimpanam.fr.po        5 Oct 2020 13:13:21 
-0000       1.67
+++ education/po/edu-cases-india-irimpanam.fr.po        10 Nov 2020 17:37:36 
-0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-21 09:01+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -64,7 +64,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Lycée professionnel d'Irimpanam (VHSS Irimpanam)"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.hr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-cases-india-irimpanam.hr-en.html   25 Jul 2020 20:00:28 
-0000      1.13
+++ education/po/edu-cases-india-irimpanam.hr-en.html   10 Nov 2020 17:37:36 
-0000      1.14
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.hr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/po/edu-cases-india-irimpanam.hr.po        25 Jul 2020 20:00:28 
-0000      1.21
+++ education/po/edu-cases-india-irimpanam.hr.po        10 Nov 2020 17:37:36 
-0000      1.22
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2013-04-23 22:10+0100\n"
 "Last-Translator: Marin Rameša <marin.ramesa@gmail.com>\n"
 "Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -64,7 +64,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Strukovna viša srednja škola Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.it-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- education/po/edu-cases-india-irimpanam.it-en.html   25 Jul 2020 20:00:28 
-0000      1.31
+++ education/po/edu-cases-india-irimpanam.it-en.html   10 Nov 2020 17:37:36 
-0000      1.32
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.it.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- education/po/edu-cases-india-irimpanam.it.po        25 Jul 2020 20:00:28 
-0000      1.49
+++ education/po/edu-cases-india-irimpanam.it.po        10 Nov 2020 17:37:36 
-0000      1.50
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-02-02 19:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -63,7 +63,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Scuola professionale di Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ja-en.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/po/edu-cases-india-irimpanam.ja-en.html   30 Jun 2020 22:29:55 
-0000      1.30
+++ education/po/edu-cases-india-irimpanam.ja-en.html   10 Nov 2020 17:37:36 
-0000      1.31
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/30 22:29:55 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ja.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- education/po/edu-cases-india-irimpanam.ja.po        31 Jul 2020 02:39:08 
-0000      1.44
+++ education/po/edu-cases-india-irimpanam.ja.po        10 Nov 2020 17:37:36 
-0000      1.45
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-07-31 11:19+0900\n"
 "Last-Translator: Katsuya TANAKA <katsuya@member.fsf.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -62,7 +62,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Vocational Higher Secondary School Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.ko-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ko-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-irimpanam.ko-en.html   25 Jul 2020 20:00:28 
-0000      1.6
+++ education/po/edu-cases-india-irimpanam.ko-en.html   10 Nov 2020 17:37:36 
-0000      1.7
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.ko.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ko.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- education/po/edu-cases-india-irimpanam.ko.po        25 Jul 2020 20:00:28 
-0000      1.25
+++ education/po/edu-cases-india-irimpanam.ko.po        10 Nov 2020 17:37:36 
-0000      1.26
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2012-11-05 01:10+0900\n"
 "Last-Translator: Jongmin Yoon <blueguy@gnu.org>\n"
 "Language-Team: Korean <www-ko-translator@gnu.org>\n"
@@ -67,7 +67,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Vocational Higher Secondary School Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.lt-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-india-irimpanam.lt-en.html   25 Jul 2020 20:00:28 
-0000      1.5
+++ education/po/edu-cases-india-irimpanam.lt-en.html   10 Nov 2020 17:37:36 
-0000      1.6
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.lt.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- education/po/edu-cases-india-irimpanam.lt.po        25 Jul 2020 20:00:28 
-0000      1.16
+++ education/po/edu-cases-india-irimpanam.lt.po        10 Nov 2020 17:37:36 
-0000      1.17
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2015-08-13 21:11+0300\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Profesinė aukštesnioji pagrindinė mokykla Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.ml-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ml-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-cases-india-irimpanam.ml-en.html   10 Jul 2020 13:59:54 
-0000      1.3
+++ education/po/edu-cases-india-irimpanam.ml-en.html   10 Nov 2020 17:37:36 
-0000      1.4
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/10 13:59:54 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.ml.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ml.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-india-irimpanam.ml.po        10 Jul 2020 13:59:54 
-0000      1.15
+++ education/po/edu-cases-india-irimpanam.ml.po        10 Nov 2020 17:37:36 
-0000      1.16
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-07-09 19:51+0530\n"
 "Last-Translator: Anupa Ann Joseph <anupaannjoseph@gmail.com>\n"
 "Language-Team: Malayalam <www-ml-gnu-malayalam-project-public@gnu.org>\n"
@@ -62,7 +62,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "വൊക്കേഷനല്‍ ഹയര്‍ 
സെക്കണ്ടറി സ്കൂള്‍ ഇരിമ്പനം"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.nl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.nl-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-india-irimpanam.nl-en.html   22 Jun 2020 10:01:52 
-0000      1.4
+++ education/po/edu-cases-india-irimpanam.nl-en.html   10 Nov 2020 17:37:36 
-0000      1.5
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/22 10:01:52 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.nl.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.nl.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-irimpanam.nl.po        22 Jun 2020 10:01:52 
-0000      1.12
+++ education/po/edu-cases-india-irimpanam.nl.po        10 Nov 2020 17:37:36 
-0000      1.13
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-09-17 22:52+0200\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <Www-nl-translators@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Hogere middelbare school voor beroepsonderwijs Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.pl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pl-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-irimpanam.pl-en.html   22 Jun 2020 12:02:44 
-0000      1.6
+++ education/po/edu-cases-india-irimpanam.pl-en.html   10 Nov 2020 17:37:36 
-0000      1.7
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/22 12:02:44 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.pl.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pl.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-india-irimpanam.pl.po        22 Jun 2020 12:02:44 
-0000      1.15
+++ education/po/edu-cases-india-irimpanam.pl.po        10 Nov 2020 17:37:36 
-0000      1.16
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-27 22:10-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Zawodowa Szkoła w&nbsp;Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.pot
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pot,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- education/po/edu-cases-india-irimpanam.pot  20 Jun 2020 19:29:23 -0000      
1.24
+++ education/po/edu-cases-india-irimpanam.pot  10 Nov 2020 17:37:36 -0000      
1.25
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -57,7 +57,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pt-br-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-irimpanam.pt-br-en.html        22 Jun 2020 
13:01:14 -0000      1.7
+++ education/po/edu-cases-india-irimpanam.pt-br-en.html        10 Nov 2020 
17:37:36 -0000      1.8
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/22 13:01:14 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pt-br.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-india-irimpanam.pt-br.po     22 Jun 2020 13:01:14 
-0000      1.15
+++ education/po/edu-cases-india-irimpanam.pt-br.po     10 Nov 2020 17:37:36 
-0000      1.16
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-22 00:31-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Escola de Ensino Profissionalizante de Irimpanam"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-india-irimpanam.ru-en.html   20 Jun 2020 19:58:49 
-0000      1.11
+++ education/po/edu-cases-india-irimpanam.ru-en.html   10 Nov 2020 17:37:36 
-0000      1.12
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/20 19:58:49 $
+$Date: 2020/11/10 17:37:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-india-irimpanam.ru.po        20 Jun 2020 19:58:49 
-0000      1.23
+++ education/po/edu-cases-india-irimpanam.ru.po        10 Nov 2020 17:37:36 
-0000      1.24
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-20 00:30+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -63,7 +63,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Ирумпанамское старшее среднее 
профессиональное училище"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.tr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-cases-india-irimpanam.tr-en.html   21 Jun 2020 07:59:07 
-0000      1.3
+++ education/po/edu-cases-india-irimpanam.tr-en.html   10 Nov 2020 17:37:37 
-0000      1.4
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/21 07:59:07 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.tr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-irimpanam.tr.po        21 Jun 2020 07:40:59 
-0000      1.12
+++ education/po/edu-cases-india-irimpanam.tr.po        10 Nov 2020 17:37:37 
-0000      1.13
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-21 09:37+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -61,7 +61,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Irimpanam Mesleki Okulu"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.uk-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/po/edu-cases-india-irimpanam.uk-en.html   25 Jul 2020 20:00:28 
-0000      1.10
+++ education/po/edu-cases-india-irimpanam.uk-en.html   10 Nov 2020 17:37:37 
-0000      1.11
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.uk.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- education/po/edu-cases-india-irimpanam.uk.po        25 Jul 2020 20:00:28 
-0000      1.20
+++ education/po/edu-cases-india-irimpanam.uk.po        10 Nov 2020 17:37:37 
-0000      1.21
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-11-05 12:33+0100\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <andriykopanytsia@gmail.com>\n"
@@ -66,7 +66,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Ірімпанамська річна вища середня 
школа"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-cases-india-irimpanam.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.zh-cn-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-irimpanam.zh-cn-en.html        21 Jun 2020 
02:29:15 -0000      1.7
+++ education/po/edu-cases-india-irimpanam.zh-cn-en.html        10 Nov 2020 
17:37:37 -0000      1.8
@@ -41,9 +41,11 @@
 <div  id="last-div" class="reduced-width">
 <h2>Vocational Higher Secondary School Irimpanam</h2>
 
-<p class="italic">
+<blockquote>
+<p>
 The following report is based on information provided to us by the 
 school's staff.</p>         
+</blockquote>
 
 <div class="article">
 <h3>Location</h3>
@@ -266,7 +268,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/21 02:29:15 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-cases-india-irimpanam.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.zh-cn.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- education/po/edu-cases-india-irimpanam.zh-cn.po     21 Jun 2020 02:29:15 
-0000      1.14
+++ education/po/edu-cases-india-irimpanam.zh-cn.po     10 Nov 2020 17:37:37 
-0000      1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-21 09:49+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -60,7 +60,7 @@
 msgid "Vocational Higher Secondary School Irimpanam"
 msgstr "Irimpanam高级职业中学"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "The following report is based on information provided to us by the school's "
 "staff."

Index: education/po/edu-schools.ar-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ar-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-schools.ar-en.html 6 Oct 2020 08:42:02 -0000       1.3
+++ education/po/edu-schools.ar-en.html 10 Nov 2020 17:37:37 -0000      1.4
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.ar.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ar.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- education/po/edu-schools.ar.po      6 Oct 2020 08:42:02 -0000       1.34
+++ education/po/edu-schools.ar.po      10 Nov 2020 17:37:37 -0000      1.35
@@ -13,7 +13,7 @@
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-01-26 16:23+0200\n"
 "Last-Translator: Karam Assany <karam.assany.web@gmail.com>\n"
 "Language-Team: Arabic\n"
@@ -73,7 +73,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "بقلم <a href=\"http://www.stallman.org/\";>ريتشارد ستولم
ان</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -83,7 +83,7 @@
 "حتى الجامعة، أن تمتلك واجبًا أخلاقيًا 
لتدرس <a href=\"/education/education.html"
 "\">البرامج الحرة فقط.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.ca-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ca-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-schools.ca-en.html 6 Oct 2020 08:42:02 -0000       1.13
+++ education/po/edu-schools.ca-en.html 10 Nov 2020 17:37:37 -0000      1.14
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.ca.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ca.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- education/po/edu-schools.ca.po      6 Oct 2020 08:42:02 -0000       1.35
+++ education/po/edu-schools.ca.po      10 Nov 2020 17:37:37 -0000      1.36
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: schools.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-04-23 17:57+0200\n"
 "Last-Translator: Miquel Puigpelat <mpuigpe1@xtec.cat>\n"
 "Language-Team: Catalan <mpuigpe1@xtec.cat>\n"
@@ -67,7 +67,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "per <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -77,7 +77,7 @@
 "fins a la universitat) té el deure moral de <a href=\"/education/education."
 "html\">ensenyar només programari lliure.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.de-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-schools.de-en.html 6 Oct 2020 08:42:02 -0000       1.33
+++ education/po/edu-schools.de-en.html 10 Nov 2020 17:37:37 -0000      1.34
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.de.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- education/po/edu-schools.de.po      6 Oct 2020 08:42:02 -0000       1.62
+++ education/po/edu-schools.de.po      10 Nov 2020 17:37:37 -0000      1.63
@@ -9,7 +9,7 @@
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-09-13 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "von <a href=\"//www.stallman.org/\">Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -78,7 +78,7 @@
 "Vorschule bis Universität) haben eine moralische Verpflichtung <a href=\"/"
 "education/\">nur Freie Software zu lehren</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.el-diff.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.el-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-schools.el-diff.html       6 Oct 2020 08:42:02 -0000       
1.33
+++ education/po/edu-schools.el-diff.html       10 Nov 2020 17:37:37 -0000      
1.34
@@ -66,15 +66,14 @@
 &lt;p&gt;Educational activities (including schools)</strong></del></span> 
<span class="inserted"><ins><em>Stallman&lt;/a&gt;&lt;/address&gt;
 &lt;hr class="thin" /&gt;
 &lt;div class="article"&gt;
-&lt;p class="italic"&gt;
+&lt;blockquote&gt;
+&lt;p&gt;
 Educational activities, including schools of all levels from
 kindergarten to university,</em></ins></span> have a moral duty
 to &lt;a href="/education/education.html"&gt;teach only free
 software.&lt;/a&gt;&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;All</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p class="italic"&gt;All</em></ins></span> 
computer users ought to 
+&lt;p&gt;All computer users ought to 
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;
 insist on free software&lt;/a&gt;: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -84,7 +83,8 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;div 
class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 
 &lt;p&gt;Free software can save schools money, but this is a secondary
 benefit.  Savings are possible because free software gives schools,
@@ -243,7 +243,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: education/po/edu-schools.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.el.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- education/po/edu-schools.el.po      6 Oct 2020 08:42:02 -0000       1.31
+++ education/po/edu-schools.el.po      10 Nov 2020 17:37:37 -0000      1.32
@@ -12,7 +12,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2015-05-04 11:11+0200\n"
 "Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
 "Language-Team: Greek <www-el-translators@gnu.org>\n"
@@ -72,7 +72,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "από τον <a href=\"http://www.stallman.org/\";>Richard 
Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Educational [-activities (including schools)-] {+activities, including
 # | schools of all levels from kindergarten to university,+} have a moral duty
 # | to <a href=\"/education/education.html\">teach only free software.</a>
@@ -89,7 +89,7 @@
 "καθήκον <a href=\"/education/education.html\">να διδάσκουν 
μόνο ελεύθερο "
 "λογισμικό.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.es-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- education/po/edu-schools.es-en.html 6 Oct 2020 08:42:02 -0000       1.34
+++ education/po/edu-schools.es-en.html 10 Nov 2020 17:37:37 -0000      1.35
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- education/po/edu-schools.es.po      6 Oct 2020 08:42:02 -0000       1.46
+++ education/po/edu-schools.es.po      10 Nov 2020 17:37:37 -0000      1.47
@@ -12,7 +12,7 @@
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-01-04 10:58+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -71,7 +71,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "por <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -82,7 +82,7 @@
 "education/education.html\">el deber moral de enseñar únicamente software "
 "libre</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.fr-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- education/po/edu-schools.fr-en.html 6 Oct 2020 08:42:02 -0000       1.41
+++ education/po/edu-schools.fr-en.html 10 Nov 2020 17:37:37 -0000      1.42
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.fr.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- education/po/edu-schools.fr.po      6 Oct 2020 08:42:02 -0000       1.65
+++ education/po/edu-schools.fr.po      10 Nov 2020 17:37:37 -0000      1.66
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-28 10:01+0200\n"
 "Last-Translator: Sogal <sogal AT member.fsf.org>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -68,7 +68,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "par <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -78,7 +78,7 @@
 "d'enfants jusqu'à l'université, ont pour <a 
href=\"/education/education.html"
 "\">devoir moral de n'enseigner que le logiciel libre</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.hr-diff.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.hr-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-schools.hr-diff.html       6 Oct 2020 08:42:02 -0000       
1.13
+++ education/po/edu-schools.hr-diff.html       10 Nov 2020 17:37:37 -0000      
1.14
@@ -66,15 +66,14 @@
 &lt;p&gt;Educational activities (including schools)</strong></del></span> 
<span class="inserted"><ins><em>Stallman&lt;/a&gt;&lt;/address&gt;
 &lt;hr class="thin" /&gt;
 &lt;div class="article"&gt;
-&lt;p class="italic"&gt;
+&lt;blockquote&gt;
+&lt;p&gt;
 Educational activities, including schools of all levels from
 kindergarten to university,</em></ins></span> have a moral duty
 to &lt;a href="/education/education.html"&gt;teach only free
 software.&lt;/a&gt;&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;All</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p class="italic"&gt;All</em></ins></span> 
computer users ought to 
+&lt;p&gt;All computer users ought to 
 <span class="inserted"><ins><em>&lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;</em></ins></span>
 insist on free <span 
class="removed"><del><strong>software:</strong></del></span> <span 
class="inserted"><ins><em>software&lt;/a&gt;:</em></ins></span> it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -84,7 +83,8 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;div 
class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 
 &lt;p&gt;Free software can save schools money, but this is a secondary
 benefit.  Savings are possible because free software gives schools,
@@ -243,7 +243,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: education/po/edu-schools.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.hr.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- education/po/edu-schools.hr.po      6 Oct 2020 08:42:02 -0000       1.26
+++ education/po/edu-schools.hr.po      10 Nov 2020 17:37:37 -0000      1.27
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2014-04-10 21:59+0100\n"
 "Last-Translator: Martina Bebek <martinaporec@pulsir.eu>\n"
 "Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -70,7 +70,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "Autor: <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Educational [-activities (including schools)-] {+activities, including
 # | schools of all levels from kindergarten to university,+} have a moral duty
 # | to <a href=\"/education/education.html\">teach only free software.</a>
@@ -86,7 +86,7 @@
 "Obrazovna djelatnost (uključujući i škole) ima <a href=\"/education/"
 "education.html\">dužnost poučavati samo slobodni softver.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.it-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- education/po/edu-schools.it-en.html 6 Oct 2020 08:42:02 -0000       1.22
+++ education/po/edu-schools.it-en.html 10 Nov 2020 17:37:37 -0000      1.23
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.it.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- education/po/edu-schools.it.po      6 Oct 2020 08:42:02 -0000       1.47
+++ education/po/edu-schools.it.po      10 Nov 2020 17:37:37 -0000      1.48
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-02 10:42+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -67,7 +67,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "di <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -77,7 +77,7 @@
 "hanno il dovere morale di <a href=\"/education/education.html\">insegnare "
 "solo il software libero</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ja-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- education/po/edu-schools.ja-en.html 6 Oct 2020 08:42:02 -0000       1.25
+++ education/po/edu-schools.ja-en.html 10 Nov 2020 17:37:37 -0000      1.26
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/po/edu-schools.ja.po      6 Oct 2020 08:42:02 -0000       1.42
+++ education/po/edu-schools.ja.po      10 Nov 2020 17:37:37 -0000      1.43
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-01-16 16:18+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -65,7 +65,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a 
href=\"http://www.stallman.org/\";>リチャード・ストールマン</a>著"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -75,7 +75,7 @@
 "education/education.html\">自由なソフトウェアだ
けを教える</a>道徳的義務があり"
 "ます。"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.lt-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-schools.lt-en.html 6 Oct 2020 08:42:02 -0000       1.7
+++ education/po/edu-schools.lt-en.html 10 Nov 2020 17:37:37 -0000      1.8
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.lt.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- education/po/edu-schools.lt.po      6 Oct 2020 08:42:02 -0000       1.14
+++ education/po/edu-schools.lt.po      10 Nov 2020 17:37:37 -0000      1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-14 21:03+0200\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -64,7 +64,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "Pagal <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -74,7 +74,7 @@
 "universiteto, mokyklas, turi moralinę pareigą <a 
href=\"/education/education."
 "html\">mokyti tik laisvą programinę įrangą.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.ml-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ml-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-schools.ml-en.html 6 Oct 2020 08:42:02 -0000       1.5
+++ education/po/edu-schools.ml-en.html 10 Nov 2020 17:37:37 -0000      1.6
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.ml.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ml.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/po/edu-schools.ml.po      6 Oct 2020 08:42:02 -0000       1.39
+++ education/po/edu-schools.ml.po      10 Nov 2020 17:37:37 -0000      1.40
@@ -12,7 +12,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-04-19 17:44+0200\n"
 "Last-Translator: Aiswarya kk <aiswaryakk29@gmail.com>\n"
 "Language-Team: Malayalam <kde-i18n-doc@kde.org>\n"
@@ -71,7 +71,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "എഴുതിയതു് <a 
href=\"http://www.stallman.org/\";>റിച്ചാര്‍ഡ് 
സ്റ്റാള്‍മാന്‍</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -81,7 +81,7 @@
 "വിദ്യാഭ്യാസപരമായ 
പ്രവര്‍ത്തനങ്ങള്‍ക്കായി <a 
href=\"/education/education.html"
 "\">സ്വതന്ത്രസോഫ്റ്റ്‌വെയര്‍ 
മാത്രം പഠിപ്പിക്കാനുള്ള</a> 
ധാര്‍മ്മികമായ കര്‍ത്തവ്യം 
ഉണ്ട്."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.nl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.nl-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/po/edu-schools.nl-en.html 6 Oct 2020 08:42:02 -0000       1.10
+++ education/po/edu-schools.nl-en.html 10 Nov 2020 17:37:37 -0000      1.11
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.nl.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.nl.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- education/po/edu-schools.nl.po      6 Oct 2020 08:42:02 -0000       1.28
+++ education/po/edu-schools.nl.po      10 Nov 2020 17:37:37 -0000      1.29
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-04-03 20:34+0100\n"
 "Last-Translator: Tom Uijldert <Tom.Uijldert@gmail.com>\n"
 "Language-Team: \n"
@@ -68,7 +68,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "door <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -78,7 +78,7 @@
 "\"/education/education.html\">morele verplichting alleen vrije software te "
 "onderwijzen</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.pl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pl-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/po/edu-schools.pl-en.html 6 Oct 2020 08:42:02 -0000       1.18
+++ education/po/edu-schools.pl-en.html 10 Nov 2020 17:37:37 -0000      1.19
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.pl.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- education/po/edu-schools.pl.po      6 Oct 2020 08:42:02 -0000       1.37
+++ education/po/edu-schools.pl.po      10 Nov 2020 17:37:37 -0000      1.38
@@ -11,7 +11,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-29 20:29-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -71,7 +71,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -81,7 +81,7 @@
 "aby&nbsp;<a href=\"/education/education.html\">nauczać wyłącznie na&nbsp;"
 "wolnym oprogramowaniu.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.pot
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- education/po/edu-schools.pot        6 Oct 2020 08:42:02 -0000       1.27
+++ education/po/edu-schools.pot        10 Nov 2020 17:37:37 -0000      1.28
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -60,14 +60,14 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr ""
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
 "only free software.</a>"
 msgstr ""
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a "
 "href=\"/philosophy/free-software-even-more-important.html\"> insist on free "

Index: education/po/edu-schools.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pt-br-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-schools.pt-br-en.html      6 Oct 2020 08:42:02 -0000       
1.15
+++ education/po/edu-schools.pt-br-en.html      10 Nov 2020 17:37:37 -0000      
1.16
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pt-br.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- education/po/edu-schools.pt-br.po   6 Oct 2020 08:42:02 -0000       1.46
+++ education/po/edu-schools.pt-br.po   10 Nov 2020 17:37:37 -0000      1.47
@@ -11,7 +11,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.pt-br.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-01-01 10:50-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -70,7 +70,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "por <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -80,7 +80,7 @@
 "escola até a universidade, têm o dever moral de <a href=\"/education/"
 "education.html\">ensinar apenas software livre</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ru-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- education/po/edu-schools.ru-en.html 6 Oct 2020 08:42:02 -0000       1.31
+++ education/po/edu-schools.ru-en.html 10 Nov 2020 17:37:37 -0000      1.32
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- education/po/edu-schools.ru.po      6 Oct 2020 08:42:02 -0000       1.55
+++ education/po/edu-schools.ru.po      10 Nov 2020 17:37:37 -0000      1.56
@@ -12,7 +12,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-04-22 17:17+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -71,7 +71,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Ричард Столмен</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -81,7 +81,7 @@
 "детских садов до вузов, обязаны <a 
href=\"/education/education.html"
 "\">преподавать только свободные 
программы</a>."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.sq-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.sq-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-schools.sq-en.html 6 Oct 2020 08:42:02 -0000       1.13
+++ education/po/edu-schools.sq-en.html 10 Nov 2020 17:37:37 -0000      1.14
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.sq.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.sq.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/po/edu-schools.sq.po      6 Oct 2020 08:42:02 -0000       1.32
+++ education/po/edu-schools.sq.po      10 Nov 2020 17:37:37 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-01-03 17:54+0200\n"
 "Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
 "Language-Team: sq\n"
@@ -66,7 +66,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "nga <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -76,7 +76,7 @@
 "deri në universitete, kanë një detyrim moral <a 
href=\"/education/education."
 "html\">të japin mësim vetëm software të lirë.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.tr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-schools.tr-en.html 6 Oct 2020 08:42:02 -0000       1.4
+++ education/po/edu-schools.tr-en.html 10 Nov 2020 17:37:37 -0000      1.5
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.tr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-schools.tr.po      6 Oct 2020 08:42:02 -0000       1.15
+++ education/po/edu-schools.tr.po      10 Nov 2020 17:37:37 -0000      1.16
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-31 08:58+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -66,7 +66,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "yazan <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -76,7 +76,7 @@
 "faaliyetleri, <a href=\"/education/education.html\">sadece özgür 
yazılımı "
 "öğretmek gibi ahlaki bir göreve sahiptir.</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.uk-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- education/po/edu-schools.uk-en.html 6 Oct 2020 08:42:02 -0000       1.14
+++ education/po/edu-schools.uk-en.html 10 Nov 2020 17:37:37 -0000      1.15
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.uk.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/po/edu-schools.uk.po      6 Oct 2020 08:42:02 -0000       1.38
+++ education/po/edu-schools.uk.po      10 Nov 2020 17:37:37 -0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-01-01 09:20+0200\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <>\n"
@@ -67,7 +67,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Річард Столмен</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -77,7 +77,7 @@
 "до університету морально <a 
href=\"/education/education.html\">зобов'язані "
 "викладати тільки вільні програми.</a> "
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-schools.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.zh-cn-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-schools.zh-cn-en.html      6 Oct 2020 08:42:02 -0000       
1.4
+++ education/po/edu-schools.zh-cn-en.html      10 Nov 2020 17:37:37 -0000      
1.5
@@ -36,13 +36,14 @@
 by <a href="http://www.stallman.org/";>Richard Stallman</a></address>
 <hr class="thin" />
 <div class="article">
-<p class="italic">
+<blockquote>
+<p>
 Educational activities, including schools of all levels from
 kindergarten to university, have a moral duty
 to <a href="/education/education.html">teach only free
 software.</a></p>
 
-<p class="italic">All computer users ought to 
+<p>All computer users ought to 
 <a href="/philosophy/free-software-even-more-important.html">
 insist on free software</a>: it gives users
 the freedom to control their own computers&mdash;with proprietary
@@ -52,6 +53,7 @@
 reasons apply to schools as they do to everyone.  However, the purpose
 of this article is to present the additional reasons that apply
 specifically to education.</p>
+</blockquote>
 <div class="column-limit"></div>
 
 <p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-schools.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.zh-cn.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-schools.zh-cn.po   6 Oct 2020 08:42:02 -0000       1.7
+++ education/po/edu-schools.zh-cn.po   10 Nov 2020 17:37:37 -0000      1.8
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-01-01 15:54+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -62,7 +62,7 @@
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Richard Stallman</a> 著"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Educational activities, including schools of all levels from kindergarten to "
 "university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -71,7 +71,7 @@
 "教育活动,包括从幼儿园到大学的各级学校,有道德职责<a 
href=\"/education/"
 "education.html\">只教授自由软件。</a>"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All computer users ought to <a href=\"/philosophy/free-software-even-more-"
 "important.html\"> insist on free software</a>: it gives users the freedom to "

Index: education/po/edu-software-gimp.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.es-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- education/po/edu-software-gimp.es-en.html   1 Aug 2020 09:29:15 -0000       
1.1
+++ education/po/edu-software-gimp.es-en.html   10 Nov 2020 17:37:37 -0000      
1.2
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/08/01 09:29:15 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/po/edu-software-gimp.fr-en.html   29 Jun 2020 11:32:41 -0000      
1.39
+++ education/po/edu-software-gimp.fr-en.html   10 Nov 2020 17:37:37 -0000      
1.40
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.hr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-software-gimp.hr-en.html   29 Jun 2020 11:32:41 -0000      
1.13
+++ education/po/edu-software-gimp.hr-en.html   10 Nov 2020 17:37:37 -0000      
1.14
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/po/edu-software-gimp.it-en.html   29 Jun 2020 11:32:41 -0000      
1.8
+++ education/po/edu-software-gimp.it-en.html   10 Nov 2020 17:37:37 -0000      
1.9
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.ja-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-software-gimp.ja-en.html   29 Jun 2020 11:32:41 -0000      
1.6
+++ education/po/edu-software-gimp.ja-en.html   10 Nov 2020 17:37:37 -0000      
1.7
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.pt-br-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-software-gimp.pt-br-en.html        29 Jun 2020 11:32:41 
-0000      1.5
+++ education/po/edu-software-gimp.pt-br-en.html        10 Nov 2020 17:37:37 
-0000      1.6
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.tr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-software-gimp.tr-en.html   29 Jun 2020 11:32:41 -0000      
1.3
+++ education/po/edu-software-gimp.tr-en.html   10 Nov 2020 17:37:37 -0000      
1.4
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.uk-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-software-gimp.uk-en.html   29 Jun 2020 11:32:41 -0000      
1.4
+++ education/po/edu-software-gimp.uk-en.html   10 Nov 2020 17:37:37 -0000      
1.5
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/edu-software-gimp.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.zh-cn-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-software-gimp.zh-cn-en.html        29 Jun 2020 11:32:41 
-0000      1.5
+++ education/po/edu-software-gimp.zh-cn-en.html        10 Nov 2020 17:37:37 
-0000      1.6
@@ -75,7 +75,7 @@
 <a 
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html";>her
 
 work</a>:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;It's a program I use for different works: photo manipulation
 (mixing images together), drawings (my &lsquo;digital fragments&rsquo; in 
relation 
 to my &lsquo;real fragments&rsquo; made on paper), teaching to teenagers, 
preparing 
@@ -134,7 +134,7 @@
 <p>At the time of writing (March 2012) Mani is a student of Computer 
 Science in Bangalore. He says:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;First I need to say thanks to the Free Software movement, it 
 allowed me to start learning GIMP. It was my first achievement in life, 
 and I sold many paintings at a Free Software conference. Later I started 
@@ -150,7 +150,7 @@
 
 <p>Richard Stallman's comment on this case:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p>&ldquo;I am more proud that GNU has been adopted by Indian Dalits than
 of its use by famous corporations.&rdquo;</p>
 </blockquote>
@@ -200,7 +200,7 @@
 <p>Isabel Saij explains why she decided to break free from the trap by 
 adopting Free Software:</p>
 
-<blockquote class="italic">
+<blockquote>
 <p> &ldquo;With proprietary programs the artist is at the mercy of the 
 software development company. Early in 2003 I used LiveMotion to design 
 my digital 2D and 3D works with interactive pieces. Later that year the 
@@ -295,7 +295,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: 
education/po/remote-education-children-freedom-privacy-at-stake.es-en.html
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/remote-education-children-freedom-privacy-at-stake.es-en.html  
6 Oct 2020 08:42:03 -0000       1.3
+++ education/po/remote-education-children-freedom-privacy-at-stake.es-en.html  
10 Nov 2020 17:37:37 -0000      1.4
@@ -274,11 +274,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Photos courtesy of Javier Sepúlveda. Licensed under 
 <a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/";>
 Creative Commons Attribution-NoDerivatives 4.0 International 
 License</a>.</p>
+</blockquote>
 </div>
 
 </div>
@@ -339,7 +341,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/remote-education-children-freedom-privacy-at-stake.es.po
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/remote-education-children-freedom-privacy-at-stake.es.po       
6 Oct 2020 08:42:03 -0000       1.7
+++ education/po/remote-education-children-freedom-privacy-at-stake.es.po       
10 Nov 2020 17:37:37 -0000      1.8
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-07-25 04:18-0400\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish\n"
@@ -538,7 +538,7 @@
 "\"/people/speakers.html#Sepulveda\">conferenciante de GNU</a> y promotor del "
 "software libre."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
 "\"http://creativecommons.org/licenses/by-nd/4.0/\";> Creative Commons "

Index: 
education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html  
6 Oct 2020 08:42:03 -0000       1.3
+++ education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html  
10 Nov 2020 17:37:37 -0000      1.4
@@ -274,11 +274,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Photos courtesy of Javier Sepúlveda. Licensed under 
 <a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/";>
 Creative Commons Attribution-NoDerivatives 4.0 International 
 License</a>.</p>
+</blockquote>
 </div>
 
 </div>
@@ -339,7 +341,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/remote-education-children-freedom-privacy-at-stake.fr.po
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.fr.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/po/remote-education-children-freedom-privacy-at-stake.fr.po       
6 Oct 2020 08:42:03 -0000       1.9
+++ education/po/remote-education-children-freedom-privacy-at-stake.fr.po       
10 Nov 2020 17:37:37 -0000      1.10
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-07-25 16:10+0200\n"
 "Last-Translator: Thérède Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -548,7 +548,7 @@
 "est aussi <a href=\"/people/speakers.html#Sepulveda\">conférencier GNU</a> "
 "et défenseur du logiciel libre."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
 "\"http://creativecommons.org/licenses/by-nd/4.0/\";> Creative Commons "

Index: education/po/remote-education-children-freedom-privacy-at-stake.pot
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.pot,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/remote-education-children-freedom-privacy-at-stake.pot 6 Oct 
2020 08:42:03 -0000       1.4
+++ education/po/remote-education-children-freedom-privacy-at-stake.pot 10 Nov 
2020 17:37:37 -0000      1.5
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -377,7 +377,7 @@
 "advocate."
 msgstr ""
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" "
 "href=\"http://creativecommons.org/licenses/by-nd/4.0/\";> Creative Commons "

Index: 
education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html  
6 Oct 2020 08:42:03 -0000       1.3
+++ education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html  
10 Nov 2020 17:37:37 -0000      1.4
@@ -274,11 +274,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Photos courtesy of Javier Sepúlveda. Licensed under 
 <a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/";>
 Creative Commons Attribution-NoDerivatives 4.0 International 
 License</a>.</p>
+</blockquote>
 </div>
 
 </div>
@@ -339,7 +341,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/remote-education-children-freedom-privacy-at-stake.tr.po
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.tr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/remote-education-children-freedom-privacy-at-stake.tr.po       
6 Oct 2020 08:42:03 -0000       1.6
+++ education/po/remote-education-children-freedom-privacy-at-stake.tr.po       
10 Nov 2020 17:37:37 -0000      1.7
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-08-22 08:27+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -528,7 +528,7 @@
 "kurucusu ve yöneticisi. O bir <a href=\"/people/speakers.html#Sepulveda"
 "\">GNU konuşmacısı</a> ve özgür yazılım savunucusudur."
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
 "\"http://creativecommons.org/licenses/by-nd/4.0/\";> Creative Commons "

Index: 
education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- 
education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html   
    6 Oct 2020 08:42:03 -0000       1.2
+++ 
education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html   
    10 Nov 2020 17:37:37 -0000      1.3
@@ -274,11 +274,13 @@
 
 <div class="infobox">
 <hr />
-<p class="italic">
+<blockquote>
+<p>
 Photos courtesy of Javier Sepúlveda. Licensed under 
 <a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/";>
 Creative Commons Attribution-NoDerivatives 4.0 International 
 License</a>.</p>
+</blockquote>
 </div>
 
 </div>
@@ -339,7 +341,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po
===================================================================
RCS file: 
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po    
6 Oct 2020 08:42:03 -0000       1.7
+++ education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po    
10 Nov 2020 17:37:37 -0000      1.8
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-08-01 18:51+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -469,7 +469,7 @@
 "个服务器管理å…
¬å¸ï¼Œå®ƒåªè¿è¡Œå’Œæä¾›è‡ªç”±è½¯ä»¶ã€‚他还是一个 <a href=\"/people/"
 "speakers.html#Sepulveda\">GNU 演讲家</a> 和自由软件倡导者。"
 
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
 "\"http://creativecommons.org/licenses/by-nd/4.0/\";> Creative Commons "

Index: philosophy/saying-no-even-once.es.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/saying-no-even-once.es.html      6 Oct 2020 08:42:12 -0000       
1.3
+++ philosophy/saying-no-even-once.es.html      10 Nov 2020 17:37:38 -0000      
1.4
@@ -16,10 +16,12 @@
 <address class="byline">por Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">Circula por ahí la falsa idea de que el Proyecto GNU exige 
que se utilice
+<blockquote>
+<p>Circula por ahí la falsa idea de que el Proyecto GNU exige que se utilice
 siempre <a href="/philosophy/free-sw.html">software libre</a> al 100%, y que
 a todo el que utilice algo menos (¿un 90%?) lo mandaremos al diablo. Nada
 más lejos de la realidad.</p>
+</blockquote>
 
 <p>Nuestro objetivo primordial es la <a
 href="/philosophy/free-software-even-more-important.html">libertad digital
@@ -158,7 +160,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/saying-no-even-once.fr.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/saying-no-even-once.fr.html      6 Oct 2020 08:42:12 -0000       
1.4
+++ philosophy/saying-no-even-once.fr.html      10 Nov 2020 17:37:38 -0000      
1.5
@@ -15,10 +15,12 @@
 <address class="byline">par Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">Un malentendu circule selon lequel le projet GNU vous 
demanderait d'utiliser
+<blockquote>
+<p>Un malentendu circule selon lequel le projet GNU vous demanderait d'utiliser
 du logiciel 100% <a href="/philosophy/free-sw.html">libre</a>, tout le
 temps. Que ce soit moins (90%?), et nous vous dirons d'aller vous faire
 voir, disent-ils. Rien n'est plus éloigné de la vérité.</p>
+</blockquote>
 
 <p>Notre but final est la <a
 href="/philosophy/free-software-even-more-important.html">liberté numérique
@@ -165,7 +167,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/saying-no-even-once.tr.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.tr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/saying-no-even-once.tr.html      6 Oct 2020 08:42:12 -0000       
1.6
+++ philosophy/saying-no-even-once.tr.html      10 Nov 2020 17:37:38 -0000      
1.7
@@ -15,10 +15,12 @@
 <address class="byline">yazan Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">GNU Projesi'nin her zaman %100 <a 
href="/philosophy/free-sw.html">özgür
+<blockquote>
+<p>GNU Projesi'nin her zaman %100 <a href="/philosophy/free-sw.html">özgür
 yazılım</a> çalıştırmanızı talep ettiği şeklinde bir yanlış anlama 
var. Daha
 az özgür herhangi bir şey (%90?) söz konusu olduğunda size defol
 diyebileceğimizi söylüyorlar. Gerçekten oldukça uzak bir söylem.</p>
+</blockquote>
 
 <p>Nihai hedefimiz <a
 href="/philosophy/free-software-even-more-important.html">herkes için
@@ -170,7 +172,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/saying-no-even-once.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.zh-cn.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/saying-no-even-once.zh-cn.html   6 Oct 2020 08:42:12 -0000       
1.5
+++ philosophy/saying-no-even-once.zh-cn.html   10 Nov 2020 17:37:38 -0000      
1.6
@@ -14,9 +14,11 @@
 <address class="byline">Richard Stallman 著</address>
 <hr class="thin" />
 
-<p class="italic">有一种误解一直在流传,说 GNU 工程要求你 
100% 运行 <a
+<blockquote>
+<p>有一种误解一直在流传,说 GNU 工程要求你 100% 运行 <a
 
href="/philosophy/free-sw.html">自由软件</a>,而且每时每刻。如果比
 100%
 少(90%?),那么我们就会说你
迷失了方向&mdash;&mdash;他们这样说道。这完全不是事实。</p>
+</blockquote>
 
 <p>我们的终极目标是 <a
 href="/philosophy/free-software-even-more-important.html">å…
¨äººç±»çš„数字自由</a>,一个没有非自由软件的世界。我们中有人为这个数字自由目æ
 ‡å‘起活动,拒绝所有的非自由程序。不过,实际
而言,即使是通向目æ 
‡çš„一小步也是好的。千里之行,始于足下。每次你不安装
非自由程序,或者决定一天不运行某个非自由程序,这是你
自己迈向自由的一步。每次你
拒绝和别人运行一个非自由程序,你就向他们展示了目å…
‰é•¿è¿œçš„榜样。这是迈向世界自由的一步。</p>
@@ -113,7 +115,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/self-interest.fr.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.fr.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- philosophy/self-interest.fr.html    6 Oct 2020 08:42:12 -0000       1.58
+++ philosophy/self-interest.fr.html    10 Nov 2020 17:37:38 -0000      1.59
@@ -28,7 +28,7 @@
 trouvons les résumés suivants du point de vue de Smith sur l'intérêt
 personnel :</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Loin d'être un individualiste, Smith croyait que c'était l'influence de la
 société qui nous transformait en êtres moraux. Il pensait que souvent, nous
 nous trompions sur notre propre intérêt personnel.
@@ -37,7 +37,7 @@
 <p>
 Encore plus à propos :</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 [Adam Smith] considérait la tentative d'expliquer tout comportement humain
 sur les bases de l'intérêt personnel comme peu judicieuse analytiquement et
 pernicieuse moralement. &nbsp;<a href="#fn1">[1]</a>
@@ -104,7 +104,7 @@
 personnel. D'après Thomas Sowel, un théoricien du marché libre
 contemporain :</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Il y a, bien sûr, des valeurs non économiques. Qui plus est, il y a
 <em>uniquement</em> des valeurs non économiques. L'économie n'est pas une
 valeur en soi, mais simplement une méthode d'échange d'une valeur contre une
@@ -229,7 +229,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/self-interest.ru.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.ru.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/self-interest.ru.html    6 Oct 2020 08:42:12 -0000       1.3
+++ philosophy/self-interest.ru.html    10 Nov 2020 17:37:38 -0000      1.4
@@ -27,7 +27,7 @@
 для исправления некоторого числа 
заблуждений об учении Смита, мы находим
 следующие формулировки взглядов Смита на 
личные интересы:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Смит не только не был индивидуалистом, он 
был убежден, что именно влияние
 общества превращает людей в существа 
моральные. Он считал, что люди часто
 неверно судят о собственных личных 
интересах.
@@ -36,7 +36,7 @@
 <p>
 Еще ближе к теме:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 [Адам Смит] считал попытки объяснять 
всякое поведение людей на основе личных
 интересов аналитически ошибочными и 
нравственно вредными.&nbsp;<a
 href="#fn1">[1]</a>
@@ -99,7 +99,7 @@
 своими личными интересами или хотя бы 
умерить их. Говоря словами Томаса
 Соуэлла, теоретика свободного рынка 
нашего времени,</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Есть, конечно, и неэкономические ценности. 
В самом деле, существуют
 <em>только</em> неэкономические ценности. 
Экономика представляет ценность не
 сама по себе, а только как метод размена 
одной ценности на другую. Если
@@ -225,7 +225,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/self-interest.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.zh-cn.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/self-interest.zh-cn.html 6 Oct 2020 08:42:13 -0000       1.6
+++ philosophy/self-interest.zh-cn.html 10 Nov 2020 17:37:38 -0000      1.7
@@ -21,14 +21,14 @@
 <p>
 
回答将是:&ldquo;不能&rdquo;。而且,没有一个知名的自由市场理论方面的专家会认为利己主义曾经、甚至有可能足以组织自由经济,或是将它维持一段时间。在这些理论家中,亚当.斯密经常被认为是利己主义的主要卫道士。但是在一本用来çº
 æ­£å¯¹å…
¶æ•™ä¹‰çš„误解的书中,我们看到了对他的利己主义观点的如下综述:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 与成为个人主义者
相比,斯密认为是社会的影响将人转变为道德的生物。他认为人们经常高估了自己的个人利益。
 </p></blockquote>
 
 <p>
 甚至还有更多直接的论述:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 
[亚当.斯密]认为基于利己主义来解释人类行为的尝试是分析上的被误导,并且在道德上是有害的。<a
 href="#fn1">[1]</a>
 </p></blockquote>
 
@@ -44,7 +44,7 @@
 有时候,好人会认为事情
出了差错,并开始为了某个道德准则而战斗,即使是有必
要牺牲或者
至少是限制他们自己的个人利益。用当代的自由市场理论家Thomas
 Sowell的话来说:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 世界上当然存在非经济的价值。实际
上,<em>只</em>存在非经济的价值。经济本身不是价值,只是一种价值交换的手段。如果有å
…³&lsquo;非经济价值&rsquo;(或者更å…
·ä½“地说,是&lsquo;社会价值&rsquo;或&lsquo;人类价值&rsquo;)的论断,是为了否认贸易的å†
…在真实性,或是为了å…
é™¤è´¸æ˜“过程中的一些特殊的价值,那么这种无
私的理想只有通过为å…
¶èŽ·åˆ©çš„交易才能更有效地体现出来。这就是经济的贸易。<a
 href="#fn2">[2]</a>
 </p></blockquote>
@@ -134,7 +134,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/10/06 08:42:13 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/self-interest.zh-tw.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.zh-tw.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/self-interest.zh-tw.html 6 Oct 2020 08:42:13 -0000       1.6
+++ philosophy/self-interest.zh-tw.html 10 Nov 2020 17:37:38 -0000      1.7
@@ -22,14 +22,14 @@
 回答將是:不能。而且, 沒有一個知名的自由市å 
´ç†è«–方面的專家會認為利己主義曾經、 
甚至有可能足以組織自由經濟,或是將它維持一段時間。在這些理論家中,
 亞當‧斯密經常被認為是利己主義的主要的衛道士。 
但是在一本用來糾正對他的教義的錯誤理解的書中, 
我們看到了這樣的對於他對利己主義的觀點的評述:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 「與『成為個人主義者』相比,斯密 
認為是社會的影響將人轉變為道德的生物。 
他認為人們經常高估了自己的利己主義。」
 </p></blockquote>
 
 <p>
 更多更直接的論述如下:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 
「(亞當‧斯密)認為基於利己主義來解釋人類行為的嘗試是在分析上被誤導的,
 並且在道德上是有害的。」&nbsp;<a
 href="#fn1">[1]</a>
 </p></blockquote>
@@ -57,7 +57,7 @@
 有時候,人們會認為事情
出了差錯,他們需要為了某個道德準則而奮鬥, 有必
要犧牲,或者至少是限制自己的利己主義。 當代的自由市å 
´ç†è«–家 Thomas
 Sowell 說:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 
「世界上當然存在非經濟的價值。確實的,存在唯一的非經濟的價值。
 經濟本身不是價值,只是一種價值轉移的辦法。 
如果有關於『非經濟價值』的說法
 (更具體的說,是『社會價值』或者『人類價值』), 
只是為了否認貿易的å…
§åœ¨çš„真實性,或是否認貿易過程中的一些特殊的價值,
 
那麼這種無私的理想的價值只有通過與對此的興趣進行交易才能最有效的體現出來。
 這就是經濟的貿易。」&nbsp;<a href="#fn2">[2]</a>
@@ -148,7 +148,7 @@
 <p class="unprintable"><!-- timestamp start -->
 更新時間︰
 
-$Date: 2020/10/06 08:42:13 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/saying-no-even-once.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/saying-no-even-once.es-en.html        6 Oct 2020 08:42:16 
-0000       1.2
+++ philosophy/po/saying-no-even-once.es-en.html        10 Nov 2020 17:37:38 
-0000      1.3
@@ -11,11 +11,13 @@
 <address class="byline">by Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
 Project demands you run 100% <a href="/philosophy/free-sw.html">free
 software</a>, all the time. Anything less (90%?), and we will tell
 you to get lost&mdash;they say. Nothing could be further from the
 truth.</p>
+</blockquote>
 
 <p>Our ultimate goal is <a
 href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/saying-no-even-once.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/saying-no-even-once.es.po     6 Oct 2020 08:42:16 -0000       
1.4
+++ philosophy/po/saying-no-even-once.es.po     10 Nov 2020 17:37:38 -0000      
1.5
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-06 21:03-0400\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish\n"
@@ -37,7 +37,7 @@
 msgid "by Richard Stallman"
 msgstr "por Richard Stallman"
 
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
 msgid ""
 "A misunderstanding is circulating that the GNU Project demands you run 100% "
 "<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "

Index: philosophy/po/saying-no-even-once.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/saying-no-even-once.fr-en.html        6 Oct 2020 08:42:16 
-0000       1.4
+++ philosophy/po/saying-no-even-once.fr-en.html        10 Nov 2020 17:37:38 
-0000      1.5
@@ -11,11 +11,13 @@
 <address class="byline">by Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
 Project demands you run 100% <a href="/philosophy/free-sw.html">free
 software</a>, all the time. Anything less (90%?), and we will tell
 you to get lost&mdash;they say. Nothing could be further from the
 truth.</p>
+</blockquote>
 
 <p>Our ultimate goal is <a
 href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/saying-no-even-once.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.fr.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/saying-no-even-once.fr.po     6 Oct 2020 08:42:16 -0000       
1.9
+++ philosophy/po/saying-no-even-once.fr.po     10 Nov 2020 17:37:38 -0000      
1.10
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-03 00:30+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -34,7 +34,7 @@
 msgid "by Richard Stallman"
 msgstr "par Richard Stallman"
 
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
 msgid ""
 "A misunderstanding is circulating that the GNU Project demands you run 100% "
 "<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "

Index: philosophy/po/saying-no-even-once.pot
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.pot,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/po/saying-no-even-once.pot       6 Oct 2020 08:42:16 -0000       
1.7
+++ philosophy/po/saying-no-even-once.pot       10 Nov 2020 17:37:38 -0000      
1.8
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -30,7 +30,7 @@
 msgid "by Richard Stallman"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
 msgid ""
 "A misunderstanding is circulating that the GNU Project demands you run 100% "
 "<a href=\"/philosophy/free-sw.html\">free software</a>, all the "

Index: philosophy/po/saying-no-even-once.tr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.tr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/saying-no-even-once.tr-en.html        6 Oct 2020 08:42:16 
-0000       1.6
+++ philosophy/po/saying-no-even-once.tr-en.html        10 Nov 2020 17:37:38 
-0000      1.7
@@ -11,11 +11,13 @@
 <address class="byline">by Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
 Project demands you run 100% <a href="/philosophy/free-sw.html">free
 software</a>, all the time. Anything less (90%?), and we will tell
 you to get lost&mdash;they say. Nothing could be further from the
 truth.</p>
+</blockquote>
 
 <p>Our ultimate goal is <a
 href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/saying-no-even-once.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.tr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/po/saying-no-even-once.tr.po     6 Oct 2020 08:42:16 -0000       
1.12
+++ philosophy/po/saying-no-even-once.tr.po     10 Nov 2020 17:37:38 -0000      
1.13
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-05 13:57+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -33,7 +33,7 @@
 msgid "by Richard Stallman"
 msgstr "yazan Richard Stallman"
 
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
 msgid ""
 "A misunderstanding is circulating that the GNU Project demands you run 100% "
 "<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "

Index: philosophy/po/saying-no-even-once.zh-cn-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.zh-cn-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/saying-no-even-once.zh-cn-en.html     6 Oct 2020 08:42:16 
-0000       1.6
+++ philosophy/po/saying-no-even-once.zh-cn-en.html     10 Nov 2020 17:37:38 
-0000      1.7
@@ -11,11 +11,13 @@
 <address class="byline">by Richard Stallman</address>
 <hr class="thin" />
 
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
 Project demands you run 100% <a href="/philosophy/free-sw.html">free
 software</a>, all the time. Anything less (90%?), and we will tell
 you to get lost&mdash;they say. Nothing could be further from the
 truth.</p>
+</blockquote>
 
 <p>Our ultimate goal is <a
 href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/saying-no-even-once.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.zh-cn.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/saying-no-even-once.zh-cn.po  6 Oct 2020 08:42:16 -0000       
1.13
+++ philosophy/po/saying-no-even-once.zh-cn.po  10 Nov 2020 17:37:38 -0000      
1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-06-03 14:37+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -29,7 +29,7 @@
 msgid "by Richard Stallman"
 msgstr "Richard Stallman 著"
 
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
 msgid ""
 "A misunderstanding is circulating that the GNU Project demands you run 100% "
 "<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "

Index: philosophy/po/self-interest.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.fr-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/po/self-interest.fr-en.html      6 Oct 2020 08:42:16 -0000       
1.34
+++ philosophy/po/self-interest.fr-en.html      10 Nov 2020 17:37:38 -0000      
1.35
@@ -24,7 +24,7 @@
 we find the following summaries of Smith's view about
 self-interest:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Far from being an individualist, Smith believed it is the influence
 of society that transforms people into moral beings. He thought that
 people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
 <p>
 Even more directly to the point:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 [Adam Smith] regarded the attempt to explain all human behavior on
 the basis of self-interest as analytically misguided and morally
 pernicious.&nbsp;<a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
 to sacrifice, or at least qualify, their own self-interest. In the
 words of Thomas Sowell, a free-market theorist of our time:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 There are, of course, noneconomic values.  Indeed, there are
 <em>only</em> noneconomic values. Economics is not a value itself but
 merely a method of trading off one value against another.  If
@@ -201,7 +201,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/self-interest.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.ru-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/self-interest.ru-en.html      6 Oct 2020 08:42:16 -0000       
1.3
+++ philosophy/po/self-interest.ru-en.html      10 Nov 2020 17:37:38 -0000      
1.4
@@ -24,7 +24,7 @@
 we find the following summaries of Smith's view about
 self-interest:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Far from being an individualist, Smith believed it is the influence
 of society that transforms people into moral beings. He thought that
 people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
 <p>
 Even more directly to the point:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 [Adam Smith] regarded the attempt to explain all human behavior on
 the basis of self-interest as analytically misguided and morally
 pernicious.&nbsp;<a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
 to sacrifice, or at least qualify, their own self-interest. In the
 words of Thomas Sowell, a free-market theorist of our time:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 There are, of course, noneconomic values.  Indeed, there are
 <em>only</em> noneconomic values. Economics is not a value itself but
 merely a method of trading off one value against another.  If
@@ -201,7 +201,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/self-interest.zh-cn-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.zh-cn-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/self-interest.zh-cn-en.html   6 Oct 2020 08:42:16 -0000       
1.3
+++ philosophy/po/self-interest.zh-cn-en.html   10 Nov 2020 17:37:38 -0000      
1.4
@@ -24,7 +24,7 @@
 we find the following summaries of Smith's view about
 self-interest:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Far from being an individualist, Smith believed it is the influence
 of society that transforms people into moral beings. He thought that
 people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
 <p>
 Even more directly to the point:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 [Adam Smith] regarded the attempt to explain all human behavior on
 the basis of self-interest as analytically misguided and morally
 pernicious.&nbsp;<a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
 to sacrifice, or at least qualify, their own self-interest. In the
 words of Thomas Sowell, a free-market theorist of our time:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 There are, of course, noneconomic values.  Indeed, there are
 <em>only</em> noneconomic values. Economics is not a value itself but
 merely a method of trading off one value against another.  If
@@ -201,7 +201,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/self-interest.zh-tw-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.zh-tw-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/self-interest.zh-tw-en.html   6 Oct 2020 08:42:16 -0000       
1.3
+++ philosophy/po/self-interest.zh-tw-en.html   10 Nov 2020 17:37:38 -0000      
1.4
@@ -24,7 +24,7 @@
 we find the following summaries of Smith's view about
 self-interest:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 Far from being an individualist, Smith believed it is the influence
 of society that transforms people into moral beings. He thought that
 people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
 <p>
 Even more directly to the point:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 [Adam Smith] regarded the attempt to explain all human behavior on
 the basis of self-interest as analytically misguided and morally
 pernicious.&nbsp;<a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
 to sacrifice, or at least qualify, their own self-interest. In the
 words of Thomas Sowell, a free-market theorist of our time:</p>
 
-<blockquote class="italic"><p>
+<blockquote><p>
 There are, of course, noneconomic values.  Indeed, there are
 <em>only</em> noneconomic values. Economics is not a value itself but
 merely a method of trading off one value against another.  If
@@ -201,7 +201,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-games.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/malware-games.es.html   3 Nov 2020 12:00:39 -0000       1.11
+++ proprietary/malware-games.es.html   10 Nov 2020 17:37:38 -0000      1.12
@@ -60,13 +60,13 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Entre las numerosas funcionalidades maliciosas que se encuentran en los
 juegos, quizá la peor sea la <a
 href="/proprietary/proprietary-addictions.html#addictiveness">adictividad</a>,
 pues afecta a los usuarios no solo materialmente, sino también
 psicológicamente.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -426,7 +426,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/03 12:00:39 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-games.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/malware-games.fr.html   2 Nov 2020 18:03:07 -0000       1.49
+++ proprietary/malware-games.fr.html   10 Nov 2020 17:37:38 -0000      1.50
@@ -59,12 +59,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Parmi les nombreuses fonctionnalités malveillantes des jeux, l'<a
 href="/proprietary/proprietary-addictions.html#addictiveness">addictivité</a>
 est peut-être la pire, car elle affecte l'utilisateur sur le plan
 psychologique aussi bien que matériel.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -425,7 +425,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/malware-games.ru.html   2 Nov 2020 18:03:07 -0000       1.47
+++ proprietary/malware-games.ru.html   10 Nov 2020 17:37:38 -0000      1.48
@@ -60,12 +60,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Среди многочисленных вредоносных 
функций, наличествующих в играх, <a
 href="/proprietary/proprietary-addictions.html#addictiveness"> 
выработка
 зависимости</a>, возможно, самая худшая, 
поскольку она воздействует на
 пользователей не только материально, но и 
психически.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -427,7 +427,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/malware-mobiles.es.html 17 Oct 2020 12:00:46 -0000      1.80
+++ proprietary/malware-mobiles.es.html 10 Nov 2020 17:37:38 -0000      1.81
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Casi todos los teléfonos móviles causan dos serios agravios a los 
usuarios:
 rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los
 llamamos «el sueño de Stalin».</p>
@@ -73,7 +73,7 @@
 <a href="/proprietary/malware-apple.html">Los sistemas operativos de Apple
 son <cite>malware</cite></a> y <a href="/proprietary/malware-google.html">El
 software de Google es <cite>malware</cite></a>, respectivamente.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -1352,7 +1352,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/17 12:00:46 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/malware-mobiles.fr.html 17 Oct 2020 08:59:36 -0000      1.109
+++ proprietary/malware-mobiles.fr.html 10 Nov 2020 17:37:38 -0000      1.110
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Presque tous les téléphones mobiles nuisent gravement à leurs 
utilisateurs
 de deux manières : ils suivent leurs mouvements et ils écoutent leurs
 conversations. C'est pourquoi nous les appelons « le rêve de Staline 
».</p>
@@ -72,7 +72,7 @@
 d'exploitation d'Apple</a> et <a
 href="/proprietary/malware-google.html">Malveillance des logiciels de
 Google</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -1347,7 +1347,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/malware-mobiles.ru.html 19 Oct 2020 10:00:04 -0000      1.103
+++ proprietary/malware-mobiles.ru.html 10 Nov 2020 17:37:38 -0000      1.104
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Почти все мобильные телефоны причиняют 
две серьезных несправедливости своим
 пользователям: отслеживают их перемещения 
и прослушивают их переговоры. Вот
 почему мы называем их &ldquo;мечтой 
Сталина&rdquo;.</p>
@@ -72,7 +72,7 @@
 href="/proprietary/malware-apple.html">Операционные системы 
Apple
 вредоносны</a> и <a 
href="/proprietary/malware-google.html">Программы Google
 вредоносны</a>, соответственно.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -1334,7 +1334,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-webpages.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/malware-webpages.es.html        24 Jun 2020 05:02:24 -0000      
1.3
+++ proprietary/malware-webpages.es.html        10 Nov 2020 17:37:38 -0000      
1.4
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>En esta página se muestran ejemplos de sitios web que contienen programas
 JavaScript que espían a los usuarios o los engañan. Utilizan lo que nosotros
 llamamos <a href="/philosophy/javascript-trap.html">la trampa de
 JavaScript</a>. Por supuesto que muchos sitios recogen la información que
 los usuarios envían, por ejemplo, mediante formularios, pero aquí no
 hablamos de eso.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -319,7 +319,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/malware-webpages.fr.html        5 Oct 2020 13:13:24 -0000       
1.24
+++ proprietary/malware-webpages.fr.html        10 Nov 2020 17:37:38 -0000      
1.25
@@ -59,14 +59,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Cette page répertorie des sites web contenant des programmes JavaScript qui
 espionnent les utilisateurs ou les trompent. Ils se servent de ce que nous
 appelons <a href="/philosophy/javascript-trap.html">le piège
 JavaScript</a>. Bien entendu, beaucoup de sites collectent de l'information
 envoyée par l'utilisateur, entre autres au moyen de formulaires, mais ce
 n'est pas ce dont nous voulons parler ici.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -314,7 +314,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/malware-webpages.ru.html        24 Jun 2020 05:04:03 -0000      
1.21
+++ proprietary/malware-webpages.ru.html        10 Nov 2020 17:37:38 -0000      
1.22
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>На этой странице перечислены сайты, 
содержащие несвободные программы на
 JavaScript, которые шпионят за пользователями и 
вводят их в заблуждение. Они
 пользуются тем, что мы называем <a
 href="/philosophy/javascript-trap.html">западней JavaScript</a>. Р
азумеется,
 многие сайты собирают информацию, которую 
присылает пользователь (через
 формы и другими способами), но мы говорим 
не об этом.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -314,7 +314,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/potential-malware.es.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/potential-malware.es.html       24 Jun 2020 05:02:24 -0000      
1.4
+++ proprietary/potential-malware.es.html       10 Nov 2020 17:37:38 -0000      
1.5
@@ -60,11 +60,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>En esta página se describen técnicas maliciosas que se podrían 
utilizar en
 el software privativo con fines maliciosos. No tenemos evidencia de que ya
 estén en uso.</p>
-</div>
+</blockquote>
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
@@ -212,7 +212,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/potential-malware.fr.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/potential-malware.fr.html       5 Oct 2020 13:13:24 -0000       
1.18
+++ proprietary/potential-malware.fr.html       10 Nov 2020 17:37:38 -0000      
1.19
@@ -59,11 +59,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Cette page décrit des techniques que le logiciel privateur pourrait 
utiliser
 dans le futur à des fins malveillantes. Nous n'avons pas la preuve qu'elles
 soient déjà employées actuellement.</p>
-</div>
+</blockquote>
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
@@ -211,7 +211,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/potential-malware.ru.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/potential-malware.ru.html       24 Jun 2020 05:04:03 -0000      
1.18
+++ proprietary/potential-malware.ru.html       10 Nov 2020 17:37:38 -0000      
1.19
@@ -60,11 +60,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>На этой странице описаны вредоносные 
приемы, которые несвободные программы
 могли бы применять в будущем во целях 
вредительства. У нас нет свидетельств,
 что они уже применяются.</p>
-</div>
+</blockquote>
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
@@ -215,7 +215,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-addictions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.es.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/proprietary-addictions.es.html  29 Oct 2020 11:29:54 -0000      
1.20
+++ proprietary/proprietary-addictions.es.html  10 Nov 2020 17:37:38 -0000      
1.21
@@ -61,12 +61,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Esta página se ocupa de las funcionalidades maliciosas que se añaden a
 algunos programas con el único propósito de seducir a los usuarios para que
 utilicen el programa de manera más frecuente e intensiva, con el riesgo de
 caer en la adicción.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -398,7 +398,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/29 11:29:54 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-addictions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.fr.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/proprietary-addictions.fr.html  29 Oct 2020 09:00:31 -0000      
1.25
+++ proprietary/proprietary-addictions.fr.html  10 Nov 2020 17:37:38 -0000      
1.26
@@ -59,11 +59,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Cette page s'intéresse aux fonctionnalités malveillantes ajoutées à 
certains
 programmes dans le seul but d'amener les utilisateurs à les utiliser de
 manière de plus en plus intensive, au risque d'en devenir dépendants.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -390,7 +390,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/29 09:00:31 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-addictions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.ru.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/proprietary-addictions.ru.html  29 Oct 2020 11:00:28 -0000      
1.26
+++ proprietary/proprietary-addictions.ru.html  10 Nov 2020 17:37:38 -0000      
1.27
@@ -60,12 +60,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Эта страница обсуждает вредоносные 
функции, добавляемые к некоторым
 программам единственно с целью 
соблазнения пользователей все чаще и чаще и
 интенсивнее пользоваться 
программой&nbsp;&mdash; с риском получения
 зависимости.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -390,7 +390,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/29 11:00:28 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-addictions.tr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.tr.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-addictions.tr.html  29 Oct 2020 17:01:53 -0000      
1.9
+++ proprietary/proprietary-addictions.tr.html  10 Nov 2020 17:37:38 -0000      
1.10
@@ -60,11 +60,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Bu sayfa; yalnızca kullanıcılarda bağımlılık yapma riskiyle birlikte
 kullanıcıları, programı daha sık ve yoğun bir şekilde kullanmaya
 yönlendirmek amacıyla bazı programlara eklenen kötücül işlevlerle 
ilgilidir.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Bu sayfada olması gereken ancak burada olmayan bir örnek biliyorsanız 
lütfen
@@ -392,7 +392,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2020/10/29 17:01:53 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/proprietary-back-doors.es.html  18 Oct 2020 09:59:19 -0000      
1.23
+++ proprietary/proprietary-back-doors.es.html  10 Nov 2020 17:37:38 -0000      
1.24
@@ -61,14 +61,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>En algunas funcionalidades maliciosas intervienen <a
 href="/proprietary/proprietary.html#f1">puertas traseras</a>. Se presentan
 aquí ejemplos de programas que contienen una o varias de ellas, clasificados
 según lo que sabemos que esas puertas traseras son capaces de hacer. A las
 puertas traseras que permiten un control total de los programas que las
 contienen se las llama «universales».</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -761,7 +761,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/proprietary-back-doors.fr.html  17 Oct 2020 08:59:36 -0000      
1.89
+++ proprietary/proprietary-back-doors.fr.html  10 Nov 2020 17:37:38 -0000      
1.90
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Certaines fonctionnalités malveillantes font intervenir des <a
 href="/proprietary/proprietary.html#f1">portes dérobées</a>. Voici des
 exemples de programmes privateurs qui en contiennent une ou plusieurs,
 classées d'après ce qu'elles ont le pouvoir de faire. Les portes dérobées
 qui permettent de prendre totalement le contrôle des programme qui les
 contiennent sont dites « universelles ».</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -764,7 +764,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/proprietary-back-doors.ru.html  19 Oct 2020 10:00:04 -0000      
1.83
+++ proprietary/proprietary-back-doors.ru.html  10 Nov 2020 17:37:38 -0000      
1.84
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Некоторые вредоносные функции 
опосредованы <a
 href="/proprietary/proprietary.html#f1">лазейками</a>. Здесь 
приведены
 примеры лазеек, которые содержат одну или 
несколько таких лазеек. Они
 разбиты на группы по тому, что они 
(насколько нам известно)
 позволяют. Лазейки, которые допускают 
полный контроль над содержащими их
 программами, обозначены как 
&ldquo;универсальные&rdquo;.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -753,7 +753,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-censorship.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ru.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/proprietary-censorship.ru.html  10 Nov 2020 13:30:52 -0000      
1.32
+++ proprietary/proprietary-censorship.ru.html  10 Nov 2020 17:37:38 -0000      
1.33
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Один из видов вредоносных функций&nbsp;&mdash; 
цензура доступа
 пользователей.Вот примеры программ, 
которые это делают. У нас есть <a
 href="/proprietary/proprietary-jails.html#about-page"> отдельный 
список
@@ -69,7 +69,7 @@
 
 <p>Продажа продуктов, спроектированных как 
платформа для наложения компанией
 цензуры, должна быть запрещена законом, но 
это не запрещено.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -232,7 +232,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/11/10 13:30:52 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-coverups.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-coverups.es.html    24 Jun 2020 05:02:25 -0000      
1.5
+++ proprietary/proprietary-coverups.es.html    10 Nov 2020 17:37:38 -0000      
1.6
@@ -61,11 +61,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>En esta página se muestran ejemplos en los que el software privativo tenía
 un error de programación, y los desarrolladores, al intentar ocultar su
 existencia, lo convirtieron en una funcionalidad maliciosa.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -161,7 +161,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-coverups.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/proprietary-coverups.fr.html    5 Oct 2020 13:13:24 -0000       
1.18
+++ proprietary/proprietary-coverups.fr.html    10 Nov 2020 17:37:38 -0000      
1.19
@@ -59,11 +59,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Cette page répertorie des cas où le logiciel privateur avait un bogue que
 les développeurs ont transformé en fonctionnalité malveillante en essayant
 de dissimuler son existence.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -159,7 +159,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-coverups.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.ru.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/proprietary-coverups.ru.html    24 Jun 2020 05:04:03 -0000      
1.15
+++ proprietary/proprietary-coverups.ru.html    10 Nov 2020 17:37:38 -0000      
1.16
@@ -60,11 +60,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>На этой странице перечислены примеры 
того, как в несвободной программе была
 ошибка, а разработчики превратили это во 
вредоносную функцию, пытаясь скрыть
 существование ошибки.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -161,7 +161,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-deception.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-deception.es.html   24 Jul 2020 09:00:28 -0000      
1.11
+++ proprietary/proprietary-deception.es.html   10 Nov 2020 17:37:38 -0000      
1.12
@@ -60,13 +60,13 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Las trampas son funcionalidades maliciosas que hacen que el programa sea
 deshonesto o que utilizan artimañas. Los casos de trampas que tratan de
 sacar dinero a la gente están listados en <a
 href="/proprietary/proprietary-fraud.html#main-heading">Fraude en el
 software privativo</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -243,7 +243,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/07/24 09:00:28 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/proprietary-deception.fr.html   5 Oct 2020 13:13:24 -0000       
1.39
+++ proprietary/proprietary-deception.fr.html   10 Nov 2020 17:37:38 -0000      
1.40
@@ -59,14 +59,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Voici des exemples de fonctionnalités malveillantes rendent le programme
 malhonnête ou cachent un piège. Les cas de tromperie qui vont jusqu'à
 soutirer de l'argent aux utilisateurs sont répertoriés sur une page
 spéciale : <a
 href="/proprietary/proprietary-fraud.html#main-heading">Escroqueries du
 logiciel privateur</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -243,7 +243,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-deception.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.ru.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/proprietary-deception.ru.html   23 Jul 2020 09:30:18 -0000      
1.36
+++ proprietary/proprietary-deception.ru.html   10 Nov 2020 17:37:38 -0000      
1.37
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Обман&nbsp;&mdash; вредоносная функция, 
которая заставляет программу вести
 себя нечестно или скрывает 
надувательство. Вот примеры таких 
вредоносных
 функций. Случаи обмана, которые связаны с 
присвоением чужих денег,
 рассмотрены в разделе <a
 href="/proprietary/proprietary-fraud.html#main-heading"> 
Мошенничество в
 несвободных программах</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -242,7 +242,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/07/23 09:30:18 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/proprietary-drm.es.html 18 Oct 2020 09:59:19 -0000      1.7
+++ proprietary/proprietary-drm.es.html 10 Nov 2020 17:37:38 -0000      1.8
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>En esta página se muestran ejemplos de sistemas y programas privativos que
 aplican la <em>gestión digital de restricciones</em>  (<abbr title="Digital
 Restrictions Management">DRM</abbr>): funcionalidades deliberadamente
@@ -76,7 +76,7 @@
 declarar ilegal. Apoye nuestra campaña para <a
 href="http://DefectiveByDesign.org/";>abolir el DRM</a>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -442,7 +442,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/proprietary-drm.fr.html 17 Oct 2020 08:59:36 -0000      1.47
+++ proprietary/proprietary-drm.fr.html 10 Nov 2020 17:37:38 -0000      1.48
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Voici des exemples de programmes et de systèmes privateurs qui mettent en
 œuvre la <em>gestion numérique des restrictions</em> (<abbr title="Digital
 Restrictions Management">DRM</abbr>), autrement dit des fonctionnalités
@@ -74,7 +74,7 @@
 promulguer. Merci de soutenir notre campagne pour <a
 href="http://DefectiveByDesign.org/";>l'abolition des DRM</a>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -441,7 +441,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/proprietary-drm.ru.html 19 Oct 2020 10:00:04 -0000      1.45
+++ proprietary/proprietary-drm.ru.html 10 Nov 2020 17:37:38 -0000      1.46
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Вот примеры несвободных программ и 
систем, реализующих <em>цифровое
 управление ограничениями</em>: функции, 
нарочно спроектированные для
 ограничения того, что могут делать 
пользователи. Эти функции называются
@@ -76,7 +76,7 @@
 href="http://DefectiveByDesign.org/";> упразднение 
цифрового управления
 ограничениями</a>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -451,7 +451,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-fraud.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-fraud.es.html       24 Jun 2020 05:02:25 -0000      
1.5
+++ proprietary/proprietary-fraud.es.html       10 Nov 2020 17:37:38 -0000      
1.6
@@ -60,10 +60,10 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Se presentan aquí ejemplos de software privativo que estafa a los 
usuarios
 mediante el uso de trucos para quitarles el dinero.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -164,7 +164,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-fraud.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-fraud.fr.html       5 Oct 2020 13:13:24 -0000       
1.5
+++ proprietary/proprietary-fraud.fr.html       10 Nov 2020 17:37:38 -0000      
1.6
@@ -59,10 +59,10 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Voici des exemples de logiciels privateurs qui escroquent les 
utilisateurs,
 qui leur prennent leur argent par la ruse.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -163,7 +163,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-fraud.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-fraud.ru.html       24 Jun 2020 05:04:03 -0000      
1.4
+++ proprietary/proprietary-fraud.ru.html       10 Nov 2020 17:37:38 -0000      
1.5
@@ -60,10 +60,10 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Вот примеры несвободных программ, 
которые мошенничают с пользователями,
 обманом забирая их деньги.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -166,7 +166,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-incompatibility.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-incompatibility.es.html     24 Jun 2020 05:02:25 
-0000      1.6
+++ proprietary/proprietary-incompatibility.es.html     10 Nov 2020 17:37:38 
-0000      1.7
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Una de estas funcionalidades maliciosas es la intencionada incompatibilidad
 de un programa con software de terceros que opera con el mismo tipo de
 datos.</p>
@@ -86,7 +86,7 @@
 artificiales</a> a la interoperabilidad de sus productos con el propósito de
 monopolizar el mercado, y esto lo consiguen a menudo mediante
 <cite>malware</cite> privativo.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -204,7 +204,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:38 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-incompatibility.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.fr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary-incompatibility.fr.html     5 Oct 2020 13:13:24 
-0000       1.21
+++ proprietary/proprietary-incompatibility.fr.html     10 Nov 2020 17:37:39 
-0000      1.22
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>L'une de ces fonctionnalités malveillantes est l'incompatibilité 
délibérée
 d'un programme avec d'autres logiciels qui utilisent le même type de
 données.</p>
@@ -86,7 +86,7 @@
 
href="https://www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-companies";>restrictions
 artificielles</a> à l'interopérabilité de leurs produits, souvent au moyen
 de logiciel malveillant privateur, pour obtenir le monopole du marché.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -203,7 +203,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-incompatibility.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.ru.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/proprietary-incompatibility.ru.html     24 Jun 2020 05:04:03 
-0000      1.16
+++ proprietary/proprietary-incompatibility.ru.html     10 Nov 2020 17:37:39 
-0000      1.17
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Одна из вредоносных функций&nbsp;&mdash; 
преднамеренная несовместимость
 программы с программами третьих сторон, 
которые работают с теми же типами
 данных.</p>
@@ -86,7 +86,7 @@
 искусственные ограничения</a> на 
взаимодействие их продуктов с другими,
 чтобы монополизировать рынок, и это часто 
достигается с помощью несвободных
 программ.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -206,7 +206,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-insecurity.es.html  18 Oct 2020 09:59:19 -0000      
1.17
+++ proprietary/proprietary-insecurity.es.html  10 Nov 2020 17:37:39 -0000      
1.18
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Esta página ofrece una lista de casos comprobados de inseguridad en el
 software privativo con graves consecuencias o dignos de mención. Aun cuando
 la mayor parte de estos fallos de seguridad no son intencionados, de modo
@@ -74,7 +74,7 @@
 usuarios se ven <em>imposibilitados para subsanar cualquier problema de
 seguridad que surja</em>. El software privativo es culpable de mantener a
 los usuarios en la indefensión.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -831,7 +831,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/proprietary-insecurity.fr.html  17 Oct 2020 08:59:36 -0000      
1.103
+++ proprietary/proprietary-insecurity.fr.html  10 Nov 2020 17:37:39 -0000      
1.104
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Cette page répertorie des failles de sécurité de logiciels privateurs,
 failles clairement établies qui ont de graves conséquences ou méritent
 d'être mentionnées pour d'autres raisons. Bien que la plupart de ces failles
@@ -74,7 +74,7 @@
 corriger eux-mêmes les problèmes de sécurité qui pourraient survenir</em>.
 C'est le fait de priver les utilisateurs de cette possibilité qui est
 coupable dans le logiciel privateur.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -828,7 +828,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/proprietary-insecurity.ru.html  19 Oct 2020 10:00:04 -0000      
1.92
+++ proprietary/proprietary-insecurity.ru.html  10 Nov 2020 17:37:39 -0000      
1.93
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>На этой странице перечисляются ясно 
установленные случаи уязвимости
 несвободных программ, которые имели 
тяжкие последствия или примечательны по
 другим причинам. Хотя большинство из этих 
прорех безопасности
@@ -73,7 +73,7 @@
 пользователи <em>беспомощны при необх
одимости исправить любые проблемы
 безопасности, которые возникают</em>. Именно 
то, что пользователей оставляют
 беспомощными, достойно порицания в 
несвободных программах.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -814,7 +814,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-interference.es.html        18 Oct 2020 09:59:19 
-0000      1.9
+++ proprietary/proprietary-interference.es.html        10 Nov 2020 17:37:39 
-0000      1.10
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Un tipo de funcionalidad maliciosa es la que permite la injerencia del
 desarrollador en la utilización del software. Esta página describe el modo
 en que diversos programas privativos importunan, molestan o causan problemas
@@ -68,7 +68,7 @@
 href="/proprietary/proprietary-sabotage#about-page">sabotaje</a>, pero la
 palabra «sabotaje» es demasiado fuerte para referirse a ellas.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -360,7 +360,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-interference.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.fr.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/proprietary-interference.fr.html        17 Oct 2020 08:59:36 
-0000      1.55
+++ proprietary/proprietary-interference.fr.html        10 Nov 2020 17:37:39 
-0000      1.56
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Parmi ces fonctionnalités malveillantes, il y a celles qui rendent possible
 l'ingérence du développeur dans l'utilisation du logiciel. Cette page décrit
 comment divers programmes privateurs importunent ou harcèlent l'utilisateur,
@@ -67,7 +67,7 @@
 href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, mais le
 mot « sabotage » est trop fort.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -358,7 +358,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-interference.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.ru.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/proprietary-interference.ru.html        19 Oct 2020 10:00:04 
-0000      1.46
+++ proprietary/proprietary-interference.ru.html        10 Nov 2020 17:37:39 
-0000      1.47
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Одна из разновидностей вредоносных 
функций представляет вмешательство
 разработчика в пользование программами. 
На этой странице описано, как
 различные несвободные программы 
досаждают пользователю, надоедают ему или
@@ -68,7 +68,7 @@
 href="/proprietary/proprietary-sabotage#about-page">саботаж</a>, но 
слово
 &ldquo;саботаж&rdquo; для них слишком сильно.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -354,7 +354,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/proprietary-jails.es.html       8 Nov 2020 10:29:08 -0000       
1.40
+++ proprietary/proprietary-jails.es.html       10 Nov 2020 17:37:39 -0000      
1.41
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Las «prisiones» son sistemas operativos maliciosos diseñados para 
imponer la
 censura sobre qué aplicaciones se le permite al usuario instalar. Esta <a
 href="http://i.imgur.com/ZRViDum.jpg";>imagen de una iPrisión</a> ilustra el
@@ -76,7 +76,7 @@
 <p>En esta página se listan unas pocas prisiones, con algunos de los métodos
 que emplean para censurar aplicaciones, y se incluyen ejemplos concretos de
 aplicaciones que han sido bloqueadas haciendo uso de ese poder de censura.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo que debería mencionarse en esta página y no 
está,
@@ -396,7 +396,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.fr.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/proprietary-jails.fr.html       7 Nov 2020 13:01:45 -0000       
1.47
+++ proprietary/proprietary-jails.fr.html       10 Nov 2020 17:37:39 -0000      
1.48
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Les prisons sont des systèmes d'exploitation malveillants conçus pour
 limiter le choix d'applications installables par l'utilisateur. Une <a
 href="http://i.imgur.com/ZRViDum.jpg";>image de l'iPrison</a> illustre ce
@@ -75,7 +75,7 @@
 <p>Cette page recense quelques prisons, ainsi que les méthodes qu'elles
 utilisent pour censurer les applis, et donne des exemples d'applis qui ont
 été bloquées au moyen de ce système de censure.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -398,7 +398,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/07 13:01:45 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-jails.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.ru.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/proprietary-jails.ru.html       7 Nov 2020 11:30:43 -0000       
1.45
+++ proprietary/proprietary-jails.ru.html       10 Nov 2020 17:37:39 -0000      
1.46
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>&ldquo;Тюрьмы&rdquo;&nbsp;&mdash; это вредоносные 
операционные системы,
 которые спроектированы так, чтобы 
налагать цензуру на то, какие приложения
 может устанавливать пользователь. <a
@@ -76,7 +76,7 @@
 <p>На этой странице перечислено несколько 
тюрем с некоторыми методами,
 применяемыми в них для цензуры приложений, 
а также конкретными примерами
 приложений, заблокированных властью этой 
цензуры.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -404,7 +404,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/11/07 11:30:43 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-manipulation.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-manipulation.es.html        24 Jun 2020 05:02:25 
-0000      1.5
+++ proprietary/proprietary-manipulation.es.html        10 Nov 2020 17:37:39 
-0000      1.6
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>La manipulación de los usuarios es una de estas funcionalidades
 maliciosas. Aquí se presentan ejemplos de programas que se han diseñado para
 hacerlo aprovechando características de la psicología humana.</p>
@@ -70,7 +70,7 @@
 href="/proprietary/proprietary-addictions.html">programas adictivos</a>, que
 también aprovechan características de la psicología humana, pero de forma
 mucho más elaborada y peligrosa.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -190,7 +190,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-manipulation.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.fr.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/proprietary-manipulation.fr.html        5 Oct 2020 13:13:25 
-0000       1.7
+++ proprietary/proprietary-manipulation.fr.html        10 Nov 2020 17:37:39 
-0000      1.8
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>La manipulation des utilisateurs est l'une de ces fonctionnalités
 malveillantes. Voici des exemples de programmes qui sont conçus pour
 exploiter la psychologie humaine à cette fin.</p>
@@ -69,7 +69,7 @@
 href="/proprietary/proprietary-addictions.html">programmes addictifs</a>,
 qui exploitent également la psychologie humaine, mais de manière beaucoup
 plus élaborée et dangereuse.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -187,7 +187,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:25 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-manipulation.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.ru.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-manipulation.ru.html        24 Jun 2020 05:04:04 
-0000      1.6
+++ proprietary/proprietary-manipulation.ru.html        10 Nov 2020 17:37:39 
-0000      1.7
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Манипуляция пользователями&nbsp;&mdash; одна 
из этих вредоносных
 функций. Вот примеры программ, 
спроектированных, чтобы делать это, 
опираясь
 на человеческую психологию.</p>
@@ -69,7 +69,7 @@
 href="/proprietary/proprietary-addictions.html">программ, 
вызывающих
 зависимость</a>, которые также опираются на 
человеческую психологию, но
 более изощренным и опасным образом.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -191,7 +191,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-obsolescence.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-obsolescence.es.html        24 Jun 2020 05:02:25 
-0000      1.8
+++ proprietary/proprietary-obsolescence.es.html        10 Nov 2020 17:37:39 
-0000      1.9
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>La obsolescencia programada es una de las funcionalidades maliciosas que
 pueden diseñarse en el software privativo.</p>
 
@@ -73,7 +73,7 @@
 
 <p>Aquí se presentan ejemplos de programas privativos que hacen que los
 dispositivos informáticos queden obsoletos de forma prematura.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -237,7 +237,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-obsolescence.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.fr.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-obsolescence.fr.html        5 Oct 2020 13:13:25 
-0000       1.8
+++ proprietary/proprietary-obsolescence.fr.html        10 Nov 2020 17:37:39 
-0000      1.9
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>L'obsolescence programmée est l'une des fonctionnalités malveillantes qui
 peuvent être intégrées au logiciel privateur.</p>
 
@@ -73,7 +73,7 @@
 
 <p>Voici des exemples de logiciels privateurs qui rendent des appareils
 prématurément obsolètes.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -237,7 +237,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:25 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-obsolescence.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-obsolescence.ru.html        24 Jun 2020 05:04:04 
-0000      1.8
+++ proprietary/proprietary-obsolescence.ru.html        10 Nov 2020 17:37:39 
-0000      1.9
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Запрограммированное 
устаревание&nbsp;&mdash;одна из вредоносных 
функций,
 которые могут закладываться в несвободные 
программы.</p>
 
@@ -73,7 +73,7 @@
 
 <p>Вот примеры несвободных программ, 
которые приводят к преждевременному
 устареванию аппаратуры.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -234,7 +234,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary-sabotage.es.html    8 Nov 2020 10:29:08 -0000       
1.21
+++ proprietary/proprietary-sabotage.es.html    10 Nov 2020 17:37:39 -0000      
1.22
@@ -60,12 +60,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Algunas funcionalidades maliciosas facilitan el sabotaje, esto es, la
 abusiva intromisión del desarrollador en la utilización del software, con
 graves consecuencias para los usuarios. Más abajo presentamos una lista de
 tales situaciones.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -727,7 +727,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary/proprietary-sabotage.fr.html    7 Nov 2020 13:01:45 -0000       
1.101
+++ proprietary/proprietary-sabotage.fr.html    10 Nov 2020 17:37:39 -0000      
1.102
@@ -59,12 +59,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Certaines fonctionnalités malveillantes ont pour effet le sabotage. Il
 s'agit d'une ingérence grave du développeur dans l'utilisation du logiciel,
 avec des conséquences néfastes pour les utilisateurs. Des exemples de telles
 situations sont rapportées ci-dessous.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -728,7 +728,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/07 13:01:45 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/proprietary-sabotage.ru.html    7 Nov 2020 11:30:44 -0000       
1.90
+++ proprietary/proprietary-sabotage.ru.html    10 Nov 2020 17:37:39 -0000      
1.91
@@ -60,12 +60,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Некоторые вредоносные функции служат 
проводником саботажу,
 т.е. злоупотреблению вмешательством со 
стороны разработчика в пользование
 программами, с вредными последствиями для 
пользователей. Примеры подобных
 ситуаций перечислены ниже.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -726,7 +726,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/11/07 11:30:44 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.es.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary-subscriptions.es.html       18 Oct 2020 09:59:19 
-0000      1.10
+++ proprietary/proprietary-subscriptions.es.html       10 Nov 2020 17:37:39 
-0000      1.11
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Que un programa «requiera suscripción» parece algo simple. En concreto, 
lo
 que eso significa es que el programa contiene una bomba de relojería, de
 modo que dejará de funcionar a partir de una fecha determinada. O bien que
@@ -70,7 +70,7 @@
 
 <p>Aquí se presentan ejemplos de suscripciones de software que causan un daño
 directo a los usuarios.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -238,7 +238,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/proprietary-subscriptions.fr.html       17 Oct 2020 08:59:36 
-0000      1.34
+++ proprietary/proprietary-subscriptions.fr.html       10 Nov 2020 17:37:39 
-0000      1.35
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Cela paraît simple de dire qu'un certain programme « nécessite un
 abonnement ». En pratique, cela signifie qu'il contient une bombe à
 retardement et refusera de fonctionner après telle date, ou bien qu'il est
@@ -69,7 +69,7 @@
 
 <p>Vous trouverez ci-dessous des exemples d'abonnements à des logiciels qui 
ont
 fait du tort directement aux utilisateurs.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -233,7 +233,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/proprietary-subscriptions.ru.html       19 Oct 2020 10:00:04 
-0000      1.32
+++ proprietary/proprietary-subscriptions.ru.html       10 Nov 2020 17:37:39 
-0000      1.33
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Легко сказать, что определенная 
программа &ldquo;требует подписки&rdquo;. А
 конкретно-то это значит, что она содержит 
мину замедленного действия и
 отказывается работать после 
определенного момента. Или она <a
@@ -70,7 +70,7 @@
 
 <p>Ниже приводятся примеры подписки на 
программы, которые нанесли пользователям
 непосредственный вред.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -236,7 +236,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/proprietary-surveillance.es.html        3 Nov 2020 12:00:42 
-0000       1.28
+++ proprietary/proprietary-surveillance.es.html        10 Nov 2020 17:37:39 
-0000      1.29
@@ -86,7 +86,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Una funcionalidad maliciosa muy común es la que permite espiar al
 usuario. En esta página se presentan ejemplos de <strong>casos claramente
 establecidos de software privativo que espía o rastrea al
@@ -99,7 +99,7 @@
 propia página: <a
 href="/proprietary/proprietary-tethers.html#about-page">Subordinación a un
 servidor en el software privativo</a>.</p>
-</div>
+</blockquote>
 
 <div class="important" style="clear: both">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -2899,7 +2899,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/03 12:00:42 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary/proprietary-surveillance.fr.html        2 Nov 2020 18:03:07 
-0000       1.240
+++ proprietary/proprietary-surveillance.fr.html        10 Nov 2020 17:37:39 
-0000      1.241
@@ -84,7 +84,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Une fonctionnalité malveillante très courante est l'espionnage des
 utilisateurs. Cette page rappporte des <strong>cas clairement établis de
 logiciels privateurs espionnant l'utilisateur ou le suivant à la
@@ -97,7 +97,7 @@
 ont une page dédiée : <a
 href="/proprietary/proprietary-tethers.html#about-page">Dépendance
 privatrice d'un serveur</a>.</p>
-</div>
+</blockquote>
 
 <div class="important" style="clear: both">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -2903,7 +2903,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary/proprietary-surveillance.ru.html        2 Nov 2020 18:03:07 
-0000       1.251
+++ proprietary/proprietary-surveillance.ru.html        10 Nov 2020 17:37:39 
-0000      1.252
@@ -85,7 +85,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Одна из обычных форм 
несправедливостей&nbsp;&mdash; подглядывание за
 пользователями. На этой странице записаны 
<strong>достоверно установленные
 случаи несвободных программ, которые 
шпионят за пользователями или
@@ -98,7 +98,7 @@
 них есть своя страница: <a
 href="/proprietary/proprietary-tethers.html#about-page">Привязка в
 несвободных программах</a>.</p>
-</div>
+</blockquote>
 
 <div class="important" style="clear: both">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -2881,7 +2881,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-tethers.es.html     19 Oct 2020 09:00:51 -0000      
1.11
+++ proprietary/proprietary-tethers.es.html     10 Nov 2020 17:37:39 -0000      
1.12
@@ -61,7 +61,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Subordinar un producto o programa a un servidor significa diseñarlo de tal
 modo que funcione únicamente comunicándose con un servidor específico. Esto
 es siempre una injusticia, pues significa que no se puede utilizar el
@@ -71,7 +71,7 @@
 <p>En algunos casos, la subordinación a un servidor se utiliza cometer abusos
 con los usuarios. En esta página se presentan ejemplos en los que tal
 subordinación se ha usado directamente para dañar a los usuarios.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -376,7 +376,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/19 09:00:51 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/proprietary-tethers.fr.html     17 Oct 2020 08:59:36 -0000      
1.48
+++ proprietary/proprietary-tethers.fr.html     10 Nov 2020 17:37:39 -0000      
1.49
@@ -59,7 +59,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>L'« ancrage » d'un produit ou d'un programme à un serveur signifie que 
ce
 produit ou ce programme  été conçu pour fonctionner exclusivement avec un
 serveur particulier. C'est toujours une injustice parce que cela veut dire
@@ -70,7 +70,7 @@
 <p>Dans certains cas, l'ancrage est utilisé pour faire des vilenies
 particulières aux utilisateurs. Nous signalons ici des cas où ils en ont
 pâti directement.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -374,7 +374,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.ru.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/proprietary-tethers.ru.html     19 Oct 2020 10:00:04 -0000      
1.41
+++ proprietary/proprietary-tethers.ru.html     10 Nov 2020 17:37:39 -0000      
1.42
@@ -60,7 +60,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Привязка продукта или программы 
означает, что их проектируют так, чтобы они
 работали, только связываясь с 
определенным сервером. Это всегда
 несправедливо, потому что это значит, что 
вы не можете пользоваться
@@ -70,7 +70,7 @@
 <p>В некоторых случаях привязка 
применяется, чтобы подстраивать конкретные
 пакости пользователям. На этой странице 
приведены примеры, когда привязка
 применялась, чтобы напрямую вредить 
пользователям.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -375,7 +375,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.es.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/proprietary-tyrants.es.html     24 Jun 2020 05:02:26 -0000      
1.30
+++ proprietary/proprietary-tyrants.es.html     10 Nov 2020 17:37:39 -0000      
1.31
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Un dispositivo <em>tirano</em> es un dispositivo malicioso que no permite a
 los usuarios instalar un sistema operativo diferente o modificado. Estos
 dispositivos cuentan con medidas para bloquear la ejecución de cualquier
 otro, excepto las versiones de los sistemas «aprobados». También nos
 referimos a esta práctica como «<i>tivoización</i>».
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si conoce algún ejemplo más que deba estar incluido en esta página, 
escriba
@@ -219,7 +219,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:26 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.fr.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/proprietary-tyrants.fr.html     5 Oct 2020 13:13:25 -0000       
1.32
+++ proprietary/proprietary-tyrants.fr.html     10 Nov 2020 17:37:39 -0000      
1.33
@@ -59,14 +59,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Un appareil <em>tyran</em> a comme particularité de refuser aux 
utilisateurs
 le droit d'installer un système d'exploitation différent ou modifié. Ces
 appareils ont des dispositifs destinés à bloquer l'exécution de systèmes
 autres que ceux dont les versions sont « approuvées ». Nous faisons aussi
 référence à cette pratique sous le nom de <em>tivoïsation</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -217,7 +217,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/10/05 13:13:25 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.pt-br.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-tyrants.pt-br.html  24 Jun 2020 05:02:41 -0000      
1.6
+++ proprietary/proprietary-tyrants.pt-br.html  10 Nov 2020 17:37:39 -0000      
1.7
@@ -59,14 +59,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Um <em>tirano</em> é um dispositivo malicioso que se recusa a permitir que
 os usuários instalem um sistema operacional diferente ou um sistema
 operacional modificado. Esses dispositivos têm medidas para bloquear a
 execução de qualquer coisa que não seja uma versão de sistema
 “aprovada”. Também nos referimos a essa prática como 
<em>tivoização</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Se você conhece um exemplo que deveria estar nesta página, mas não está
@@ -218,7 +218,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2020/06/24 05:02:41 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.ru.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/proprietary-tyrants.ru.html     24 Jun 2020 05:04:04 -0000      
1.33
+++ proprietary/proprietary-tyrants.ru.html     10 Nov 2020 17:37:39 -0000      
1.34
@@ -60,14 +60,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p><em>Тиран</em>&nbsp;&mdash; это вредоносное 
устройство, которое не позволяет
 пользователям устанавливать другую или 
измененную операционную систему. В
 этих устройствах есть средства, чтобы 
блокировать исполнение всего, кроме
 &ldquo;одобренных&rdquo; версий системы. Мы 
также называем эту практику
 <em>тивоизацией</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
@@ -219,7 +219,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:04 $
+$Date: 2020/11/10 17:37:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/de.po        10 Nov 2020 16:01:57 -0000      1.230
+++ proprietary/po/de.po        10 Nov 2020 17:37:39 -0000      1.231
@@ -5290,7 +5290,7 @@
 msgid "Malware in Games"
 msgstr "Schadsoftware in Spielen"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -7936,7 +7936,7 @@
 msgid "Malware in Mobile Devices"
 msgstr "Schadprogramme auf Mobilgeräten"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -7948,7 +7948,7 @@
 "are-stalin-s-dream-says-free-software-movement-founder.html\">Stalin's "
 "dream</q>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -10000,7 +10000,7 @@
 msgid "Malware in Webpages"
 msgstr "Schadsoftware in Internetpräsenzen"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -10303,7 +10303,7 @@
 msgid "Potential Malware"
 msgstr "Potenzielle Schadsoftware"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -10449,7 +10449,7 @@
 msgid "Proprietary Addictions"
 msgstr "Proprietäres Blendwerk"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -10702,7 +10702,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Proprietäre Hintertüren"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | {+Some malicious functionalities are mediated by <a
 # | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+}  Here are
 # | examples of [-demonstrated back doors in proprietary software.  They are
@@ -11082,7 +11082,7 @@
 msgid "Proprietary Censorship"
 msgstr "Proprietäre Zensur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
@@ -11111,7 +11111,7 @@
 "Installation von Anwenderprogrammen zensieren (wir nennen sie "
 "<em>Gefängnisse</em>)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -11169,7 +11169,7 @@
 msgid "Proprietary Coverups"
 msgstr "Proprietäre Vertuschungen"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -11201,7 +11201,7 @@
 msgid "Proprietary Deception"
 msgstr "Proprietäres Blendwerk"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -11290,7 +11290,7 @@
 msgid "Proprietary DRM"
 msgstr "Proprietäre Digitale Rechte-Minderung (DRM)"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -11303,7 +11303,7 @@
 "Nutzer tun können. Diese Funktionalitäten werden auch <em>digitale "
 "Handschellen</em> genannt."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -11446,7 +11446,7 @@
 msgid "Proprietary Fraud"
 msgstr "Proprietäre Tyrannen"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Here are {+some+} examples of proprietary software that [-has something
 # | worse than a back door.-] {+defrauds users&mdash;taking their money by
 # | trickery.+}
@@ -11484,13 +11484,13 @@
 msgid "Proprietary Incompatibility"
 msgstr "Inkompatibilität"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-In this section, we list characteristics-]{+A fairly common sort+} of
 # | [-Apple programs that block-] {+incompatibility is the use of secret
 # | formats or protocols. This directly blocks+} or hinder{+s+} users from
@@ -11514,7 +11514,7 @@
 "&#8209;&#160;und insbesondere vom Wechsel auf Freie Software, die das Gerät, 
"
 "auf dem die Software ausgeführt wird, befreien kann."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -11522,7 +11522,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -11530,7 +11530,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -11554,7 +11554,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Proprietäre Unsicherheit"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -11563,7 +11563,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -11760,7 +11760,7 @@
 msgid "Proprietary Interference"
 msgstr "Proprietäre Interferenz"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | {+One kind of malicious functionality mediates developer's interference
 # | into the use of the software.+} This page describes how various
 # | proprietary programs [-mess up-] {+harass or annoy the user, or cause
@@ -11841,7 +11841,7 @@
 msgid "Proprietary Jails"
 msgstr "Proprietäre Gefängnisse"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here-]{+The &ldquo;jails&rdquo;+} are [-examples of proprietary-]
 # | {+malicious+} operating systems that [-are <em>jails</em>: they-] are
 # | designed to impose censorship of which applications the user can install. 
@@ -11865,7 +11865,7 @@
 "ZRViDum.jpg\">Bild eines iGefängnisses</a> , <cite><q>Your device is your "
 "prison. Go outside.</q></cite>, illustriert dies."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -11876,7 +11876,7 @@
 "Unternehmen zu verkaufen, um Zensur zu verhängen, sollte per Gesetz verboten 
"
 "sein&#160;&#8209;&#160;ist es aber nicht."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -11936,14 +11936,14 @@
 msgid "Proprietary Manipulation"
 msgstr "Proprietäres Blendwerk"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -11965,7 +11965,7 @@
 msgid "Proprietary Obsolescence"
 msgstr "Proprietäres Blendwerk"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here are some examples-]{+Programmed obsolescence is one+} of
 # | [-demonstrated-] {+the+} malicious functionalities [-in Microsoft's-]
 # | {+that may be designed into+} proprietary software.
@@ -11980,7 +11980,7 @@
 "Hier einige Beispiele von nachgewiesenen schädlichen Funktionen in "
 "Microsofts proprietärer Software."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -11988,7 +11988,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Here are examples of proprietary [-software-] {+programs+} that [-has
 # | documented back doors.-] {+make hardware devices prematurely obsolete.+}
 #, fuzzy
@@ -12538,7 +12538,7 @@
 msgid "Proprietary Sabotage"
 msgstr "Proprietäre Sabotage"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -12723,7 +12723,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "Proprietäre Abonnements"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | It sounds simple to say that a certain program &ldquo;requires a
 # | subscription.&rdquo; What that means concretely is that it contains a time
 # | bomb, so that it will refuse to operate after that date.  Or else it is <a
@@ -12753,7 +12753,7 @@
 "href=\"/proprietary/proprietary-tethers\">an einen Server gebunden</a> und "
 "dieser überprüft das Datum. Beides ist eine bösartige Funktionalität."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -12781,7 +12781,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "„Woher wussten sie, dass ich ein Hund bin?“"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -12790,7 +12790,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -13824,7 +13824,7 @@
 msgid "Proprietary Tethers"
 msgstr "Proprietäre Haltestricke"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -13832,7 +13832,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Tethering a product or program-]{+In some cases, tethering is used+} to
 # | [-a-] {+do+} specific [-server is an injustice in itself.-] {+nasty things
 # | to the users.+}  This page reports instances where tethering was used to
@@ -13860,7 +13860,7 @@
 msgstr "Proprietäre Tyrannen"
 
 # 'tyrant' als 'tyrannical' übersetzt -> liest sich flüssiger
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
 # | refuses to allow users to install a different operating system or a
 # | modified operating system.  These devices have measures to block execution

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary/po/es.po        10 Nov 2020 16:01:57 -0000      1.328
+++ proprietary/po/es.po        10 Nov 2020 17:37:39 -0000      1.329
@@ -4865,7 +4865,7 @@
 msgid "Malware in Games"
 msgstr "<cite>Malware</cite> en el Echo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -7659,7 +7659,7 @@
 msgid "Malware in Mobile Devices"
 msgstr "<cite>Malware</cite> en los dispositivos móviles"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -7669,7 +7669,7 @@
 "rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los "
 "llamamos «el sueño de Stalin»."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -9826,7 +9826,7 @@
 msgid "Malware in Webpages"
 msgstr "<cite>Malware</cite> en otros productos"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -10120,7 +10120,7 @@
 msgid "Potential Malware"
 msgstr "<cite>:Malware</cite> potencial"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -10281,7 +10281,7 @@
 msgid "Proprietary Addictions"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -10759,7 +10759,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Los sistemas privativos son prisiones"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Some malicious functionalities are mediated by <a
 # | href=\"/proprietary/proprietary.html#f1\">back doors</a>.  Here are
 # | examples of programs that contain one or several of those, [-sorted out-]
@@ -11149,7 +11149,7 @@
 msgid "Proprietary Censorship"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
@@ -11177,7 +11177,7 @@
 "privativos que censuran la instalación</a> de programas de aplicación (los "
 "llamamos «prisiones»)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -11239,7 +11239,7 @@
 msgid "Proprietary Coverups"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -11278,7 +11278,7 @@
 msgid "Proprietary Deception"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -11395,7 +11395,7 @@
 msgid "Proprietary DRM"
 msgstr "Los sistemas privativos son prisiones"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -11408,7 +11408,7 @@
 "diseñadas para restringir lo que los usuarios pueden hacer.  Estas "
 "funcionalidades también se conocen como <em>esposas digitales</em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -11542,7 +11542,7 @@
 msgid "Proprietary Fraud"
 msgstr "Los sistemas privativos son tiranos"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Here are {+some+} examples of proprietary software that [-has something
 # | worse than a back door.-] {+defrauds users&mdash;taking their money by
 # | trickery.+}
@@ -11586,7 +11586,7 @@
 msgid "Proprietary Incompatibility"
 msgstr "Incompatibilidad de Apple"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
@@ -11594,7 +11594,7 @@
 "Una de estas funcionalidades maliciosas es la intencionada incompatibilidad "
 "de un programa con software de terceros que opera con el mismo tipo de datos."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-The &ldquo;incompatibility&rdquo; category includes-]{+A fairly common
 # | sort of incompatibility is+} the use of secret formats or [-protocols in
 # | proprietary software.-] {+protocols.+} This directly blocks or hinders
@@ -11620,7 +11620,7 @@
 "software libre que pudiera liberar el dispositivo en el que se ejecuta ese "
 "software."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -11632,7 +11632,7 @@
 "datos antiguos se volverá muy complicado si se deja de mantener el software "
 "privativo que puede leerlos."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -11644,7 +11644,7 @@
 "sistema sea tan engorrosa o lenta que resulte impracticable, a menos que se "
 "trate de una pequeña cantidad de datos."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -11678,7 +11678,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -11693,7 +11693,7 @@
 "aquí para mostrar que el software privativo no es inmune a los fallos, y a "
 "menudo es bastante chapucero."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
@@ -11853,7 +11853,7 @@
 msgid "Proprietary Interference"
 msgstr "Interferencia de Apple"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | One kind of malicious functionality mediates developer's interference into
 # | the use of the software. This page describes how various proprietary
 # | programs harass or annoy the user, or cause trouble for the user.  These
@@ -11942,7 +11942,7 @@
 msgid "Proprietary Jails"
 msgstr "Los sistemas privativos son prisiones"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here-]{+The &ldquo;jails&rdquo;+} are [-examples of proprietary-]
 # | {+malicious+} operating systems that [-are <em>jails</em>: they-] are
 # | designed to impose censorship of which applications the user can install. 
@@ -11966,7 +11966,7 @@
 "href=\"http://i.imgur.com/ZRViDum.jpg\";>imagen de una iPrisión</a> ilustra "
 "el problema."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -11977,7 +11977,7 @@
 "para que una empresa imponga la censura debería estar prohibida por la ley, "
 "pero no lo está."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -12041,7 +12041,7 @@
 msgid "Proprietary Manipulation"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
@@ -12051,7 +12051,7 @@
 "Aquí se presentan ejemplos de programas que se han diseñado para hacerlo "
 "aprovechando características de la psicología humana."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -12079,7 +12079,7 @@
 msgid "Proprietary Obsolescence"
 msgstr "Censura en el software privativo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
 # | that may be designed into proprietary [-software is obsolescence.-]
 # | {+software.+}
@@ -12094,7 +12094,7 @@
 "Una de las funcionalidades maliciosas que pueden diseñarse en el software "
 "privativo es la obsolescencia."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -12107,7 +12107,7 @@
 "tiempo, al dejar de recibir mantenimiento, o bien a desechar equipos que "
 "podrían haberse reparado."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -12555,7 +12555,7 @@
 msgid "Proprietary Sabotage"
 msgstr "Los sistemas privativos son tiranos"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -12734,7 +12734,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "Suscripciones de Microsoft"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | It sounds simple to say that a certain program &ldquo;requires a
 # | subscription.&rdquo; What that means concretely is that it contains a time
 # | bomb, so that it will refuse to operate after that date.  Or else it is <a
@@ -12764,7 +12764,7 @@
 "<a href=\"/proprietary/proprietary-tethers.html\">depende de un servidor</a> "
 "que comprueba la fecha. Ambas son funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -12804,7 +12804,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "«¿Cómo habrán descubierto que soy un perro?»"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-One-]{+A+} common [-form of mistreatment-] {+malicious functionality+}
 # | is to snoop on the user.  This page records <strong>clearly established
 # | cases of proprietary software that spies on or tracks users</strong>. 
@@ -12832,7 +12832,7 @@
 "hoard-data-government-demands/\">decir si espían a los usuarios por cuenta "
 "del Estado</a>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | All appliances and applications that are tethered to a specific server are
 # | snoopers by nature.  We do not list them [-in this page-] {+here+} because
 # | they have their own page: <a
@@ -13871,7 +13871,7 @@
 msgid "Proprietary Tethers"
 msgstr "Los sistemas privativos son tiranos"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -13884,7 +13884,7 @@
 "programa sin ese servidor. Se produce también una injusticia secundaria si "
 "no es posible comunicarse con el servidor de otra manera."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Tethering a product or program-]{+In some cases, tethering is used+} to
 # | [-a-] {+do+} specific [-server is an injustice in itself.-] {+nasty things
 # | to the users.+}  This page reports instances where tethering was used to
@@ -13912,7 +13912,7 @@
 msgid "Proprietary Tyrants"
 msgstr "Los sistemas privativos son tiranos"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
 # | refuses to allow users to install a different operating system or a
 # | modified operating system.  These devices have measures to block execution

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- proprietary/po/fr.po        10 Nov 2020 16:01:58 -0000      1.404
+++ proprietary/po/fr.po        10 Nov 2020 17:37:39 -0000      1.405
@@ -4337,7 +4337,7 @@
 msgid "Malware in Games"
 msgstr "Malveillance des jeux"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -6646,7 +6646,7 @@
 msgid "Malware in Mobile Devices"
 msgstr "Malveillance des mobiles"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -6656,7 +6656,7 @@
 "de deux manières : ils suivent leurs mouvements et ils écoutent leurs "
 "conversations. C'est pourquoi nous les appelons « le rêve de Staline »."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -8586,7 +8586,7 @@
 msgid "Malware in Webpages"
 msgstr "Malveillance des pages web"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -8844,7 +8844,7 @@
 msgid "Potential Malware"
 msgstr "Malveillance potentielle"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -8999,7 +8999,7 @@
 msgid "Proprietary Addictions"
 msgstr "Pratiques addictives du privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -9356,7 +9356,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Portes dérobées du logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -9689,7 +9689,7 @@
 msgid "Proprietary Censorship"
 msgstr "Censure par le logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -9703,7 +9703,7 @@
 "\">liste distincte des systèmes privateurs qui censurent l'installation</a> "
 "d'applications (on les appelle les &ldquo;prisons&rdquo;.)"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -9759,7 +9759,7 @@
 msgid "Proprietary Coverups"
 msgstr "Dissimulation privatrice"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -9791,7 +9791,7 @@
 msgid "Proprietary Deception"
 msgstr "Pratiques trompeuses du privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -9884,7 +9884,7 @@
 msgid "Proprietary DRM"
 msgstr "DRM du logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -9897,7 +9897,7 @@
 "conçues dans l'intention de restreindre ce que les utilisateurs peuvent "
 "faire. Ces fonctionnalités sont aussi appelées <em>menottes 
numériques</em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -10014,7 +10014,7 @@
 msgid "Proprietary Fraud"
 msgstr "Escroqueries du logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -10043,7 +10043,7 @@
 msgid "Proprietary Incompatibility"
 msgstr "Incompatibilité du logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
@@ -10051,7 +10051,7 @@
 "L'une de ces fonctionnalités malveillantes est l'incompatibilité 
délibérée "
 "d'un programme avec d'autres logiciels qui utilisent le même type de 
données."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -10064,7 +10064,7 @@
 "programme libre, qui permettrait de libérer l'appareil sur lequel tourne le "
 "logiciel."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -10076,7 +10076,7 @@
 "récupération de données anciennes sera très difficile si le logiciel "
 "privateur qui peut les lire n'est plus pris en charge."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -10088,7 +10088,7 @@
 "système, si compliquée ou si lente qu'elle n'est pas faisable pour une "
 "quantité significative de données."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -10115,7 +10115,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Insécurité du logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -10131,7 +10131,7 @@
 "logiciel privateur n'est pas exempt de bogues et qu'il est souvent tout à "
 "fait bâclé."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -10284,7 +10284,7 @@
 msgid "Proprietary Interference"
 msgstr "Ingérence privatrice"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -10357,7 +10357,7 @@
 msgid "Proprietary Jails"
 msgstr "Prisons du logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -10369,7 +10369,7 @@
 "\"http://i.imgur.com/ZRViDum.jpg\";>image de l'iPrison</a> illustre ce "
 "problème."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -10380,7 +10380,7 @@
 "servant à une société pour imposer la censure devrait être interdit par 
la "
 "loi, mais ce n'est pas le cas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -10426,7 +10426,7 @@
 msgid "Proprietary Manipulation"
 msgstr "Pratiques manipulatrices du privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
@@ -10436,7 +10436,7 @@
 "malveillantes. Voici des exemples de programmes qui sont conçus pour "
 "exploiter la psychologie humaine à cette fin."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -10456,7 +10456,7 @@
 msgid "Proprietary Obsolescence"
 msgstr "Obsolescence causée par le logiciel privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
@@ -10464,7 +10464,7 @@
 "L'obsolescence programmée est l'une des fonctionnalités malveillantes qui "
 "peuvent être intégrées au logiciel privateur."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -10478,7 +10478,7 @@
 "fabricant, ou à jeter des composant défectueux qui auraient pu être faits "
 "pour être réparables."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -10873,7 +10873,7 @@
 msgid "Proprietary Sabotage"
 msgstr "Sabotage privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -11039,7 +11039,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "Abonnements privateurs"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -11055,7 +11055,7 @@
 "serveur</a> et que ce serveur vérifie la date. L'une et l'autre sont des "
 "fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -11087,7 +11087,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "« Comment ont-ils découvert que je suis un chien ? »"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -11102,7 +11102,7 @@
 "techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
 "\">dire s'ils espionnent l'utilisateur au profit de l'État</a>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -12018,7 +12018,7 @@
 msgid "Proprietary Tethers"
 msgstr "Ancrage privateur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -12032,7 +12032,7 @@
 "également une injustice secondaire si on ne peut pas communiquer avec le "
 "serveur d'une autre manière."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -12050,7 +12050,7 @@
 msgid "Proprietary Tyrants"
 msgstr "Tyrans privateurs"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/it.po        10 Nov 2020 16:01:59 -0000      1.230
+++ proprietary/po/it.po        10 Nov 2020 17:37:39 -0000      1.231
@@ -4918,7 +4918,7 @@
 msgid "Malware in Games"
 msgstr "Spyware in giochi"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -7393,14 +7393,14 @@
 msgid "Malware in Mobile Devices"
 msgstr "Malware nei dispositivi mobili"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -9309,7 +9309,7 @@
 msgid "Malware in Webpages"
 msgstr "Malware in Echo"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -9579,7 +9579,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -9689,7 +9689,7 @@
 msgid "Proprietary Addictions"
 msgstr "DRM Proprietario"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -9942,7 +9942,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Backdoor proprietarie"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -10311,7 +10311,7 @@
 msgid "Proprietary Censorship"
 msgstr "Censura Proprietaria"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
@@ -10339,7 +10339,7 @@
 "proprietari che censurano l'installazione</a> di programmi (che chiamiamo "
 "&ldquo;prigioni&rdquo;)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -10408,7 +10408,7 @@
 msgid "Proprietary Coverups"
 msgstr "Censura Proprietaria"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -10437,7 +10437,7 @@
 msgid "Proprietary Deception"
 msgstr "DRM Proprietario"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -10497,7 +10497,7 @@
 msgid "Proprietary DRM"
 msgstr "DRM Proprietario"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -10510,7 +10510,7 @@
 "gli utenti. Queste funzionalità vengono anche chiamate <em>manette 
digitali</"
 "em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -10632,7 +10632,7 @@
 msgid "Proprietary Fraud"
 msgstr "Tiranni Proprietari"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Here are {+some+} examples of proprietary software that [-has something
 # | worse than a back door.-] {+defrauds users&mdash;taking their money by
 # | trickery.+}
@@ -10671,13 +10671,13 @@
 msgid "Proprietary Incompatibility"
 msgstr "Mancata sicurezza di Apple"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -10685,7 +10685,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -10693,7 +10693,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -10701,7 +10701,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -10726,7 +10726,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Scarsa sicurezza proprietaria"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -10735,7 +10735,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -10914,7 +10914,7 @@
 msgid "Proprietary Interference"
 msgstr "Interferenza di Apple"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Various-]{+One kind of malicious functionality mediates developer's
 # | interference into the use of the software. This page describes how
 # | various+} proprietary programs [-often mess up-] {+harass or annoy the
@@ -10983,7 +10983,7 @@
 msgid "Proprietary Jails"
 msgstr "Prigioni proprietarie"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here-]{+The &ldquo;jails&rdquo;+} are [-examples of proprietary-]
 # | {+malicious operating+} systems that are [-<em>jails</em>: they do not
 # | allow-] {+designed to impose censorship of which applications+} the user
@@ -11006,7 +11006,7 @@
 "\"http://i.imgur.com/ZRViDum.jpg\";>immagine dell'iPrigione</a> illustra "
 "questo problema."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -11016,7 +11016,7 @@
 "possiede il sistema. Vendere prodotti progettati come piattaforme tramite "
 "cui le società possono censurare dovrebbe essere illegale, ma non lo è."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -11075,14 +11075,14 @@
 msgid "Proprietary Manipulation"
 msgstr "DRM Proprietario"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -11104,13 +11104,13 @@
 msgid "Proprietary Obsolescence"
 msgstr "DRM Proprietario"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -11118,7 +11118,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | Here are examples of proprietary [-software-] {+programs+} that [-has
 # | something worse than a back door.-] {+make hardware devices prematurely
 # | obsolete.+}
@@ -11664,7 +11664,7 @@
 msgid "Proprietary Sabotage"
 msgstr "Sabotaggio proprietario"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -11832,7 +11832,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "Insicurezza di Microsoft"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -11842,7 +11842,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -11872,7 +11872,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Come fanno a sapere che sono un cane?&rdquo;"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -11881,7 +11881,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -12934,7 +12934,7 @@
 msgid "Proprietary Tethers"
 msgstr "Tiranni Proprietari"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -12942,7 +12942,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -12957,7 +12957,7 @@
 msgid "Proprietary Tyrants"
 msgstr "Tiranni Proprietari"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
 # | refuses to allow users to install a different operating system or a
 # | modified operating system.  These devices have measures to block execution

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/ja.po        10 Nov 2020 16:01:59 -0000      1.238
+++ proprietary/po/ja.po        10 Nov 2020 17:37:40 -0000      1.239
@@ -3773,7 +3773,7 @@
 msgid "Malware in Games"
 msgstr "ゲームのマルウェア"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -5748,14 +5748,14 @@
 msgid "Malware in Mobile Devices"
 msgstr "モバイル・デバイスのマルウェア"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -7200,7 +7200,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -7409,7 +7409,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -7513,7 +7513,7 @@
 msgid "Proprietary Addictions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -7765,7 +7765,7 @@
 msgid "Proprietary Back Doors"
 msgstr "プロプライエタリなバックドア"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of demonstrated back doors in proprietary software."
@@ -8044,7 +8044,7 @@
 msgid "Proprietary Censorship"
 msgstr "プロプライエタリな検閲"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that impose censorship on what "
@@ -8064,7 +8064,7 @@
 
"proprietary-jails.html\">インストレーションを検閲するプロプライエタリなシステ"
 "ム
のリスト</a>(わたしたちはそれを「牢獄」と呼びます)は別にあります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -8117,7 +8117,7 @@
 msgid "Proprietary Coverups"
 msgstr "プロプライエタリなもみ消し"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -8148,7 +8148,7 @@
 msgid "Proprietary Deception"
 msgstr "プロプライエタリの欺き"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -8222,7 +8222,7 @@
 msgid "Proprietary DRM"
 msgstr "プロプライエタリなDRM"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -8233,7 +8233,7 @@
 "(DRM)を実装している例です: 
ユーザができることを意図的に制限するように設計され"
 "た機能です。この機能は、<em>ディジタル手錠
</em>とも呼ばれます。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -8335,7 +8335,7 @@
 msgid "Proprietary Fraud"
 msgstr "プロプライエタリな暴君"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary software that has something worse than a "
@@ -8363,13 +8363,13 @@
 msgid "Proprietary Incompatibility"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -8377,7 +8377,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -8385,7 +8385,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -8393,7 +8393,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -8418,7 +8418,7 @@
 msgid "Proprietary Insecurity"
 msgstr "プロプライエタリの危険性"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -8427,7 +8427,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -8545,7 +8545,7 @@
 msgid "Proprietary Interference"
 msgstr "プロプライエタリな干渉"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "This page describes how various proprietary programs mess up the user's "
@@ -8610,7 +8610,7 @@
 msgid "Proprietary Jails"
 msgstr "プロプライエタリな牢獄"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that are <em>jails</em>: they do "
@@ -8626,7 +8626,7 @@
 "リケーションをインストールすることを認めません。<a 
href=\"http://i.imgur.com/";
 "ZRViDum.jpg\">iPrisonの画像</a>がこの問題を描いています。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -8636,7 +8636,7 @@
 "す。一つの会社のプラットフォーム
として、検閲を強制するように設計された製品を"
 
"販売するのは法律で禁止されるべきですが、そうなっていません。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -8684,14 +8684,14 @@
 msgid "Proprietary Manipulation"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -8712,13 +8712,13 @@
 msgid "Proprietary Obsolescence"
 msgstr "プロプライエタリの欺き"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -8726,7 +8726,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary software that has something worse than a "
@@ -9124,7 +9124,7 @@
 msgid "Proprietary Sabotage"
 msgstr "プロプライエタリな妨害行為"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -9258,7 +9258,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "プロプライエタリな購読"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "It sounds simple to say that a certain program &ldquo;requires a "
@@ -9281,7 +9281,7 @@
 
"サーバへ繋ぎ止め</a>られていて、サーバが日付をチェックします。どちらにしても"
 "悪意のある機能です。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -9311,7 +9311,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "「どうやって、わたしが犬だとわかったんだろう?」"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -9320,7 +9320,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -10215,7 +10215,7 @@
 msgid "Proprietary Tethers"
 msgstr "プロプライエタリな繋ぎ止め"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -10223,7 +10223,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -10240,7 +10240,7 @@
 msgid "Proprietary Tyrants"
 msgstr "プロプライエタリな暴君"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "A <em>tyrant</em> device is one that refuses to allow users to install a "

Index: proprietary/po/malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/malware-games.de-diff.html   2 Nov 2020 17:32:38 -0000       
1.48
+++ proprietary/po/malware-games.de-diff.html   10 Nov 2020 17:37:40 -0000      
1.49
@@ -76,14 +76,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Among the numerous malicious functionalities that are 
found</em></ins></span> in <span 
class="inserted"><ins><em>games,</em></ins></span>
 &lt;a
 <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;
 whether</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
 addictiveness&lt;/a&gt; may be</em></ins></span> the <span 
class="inserted"><ins><em>worst, because it doesn't only 
affect</em></ins></span> users <span class="removed"><del><strong>have 
control</strong></del></span>
 <span class="inserted"><ins><em>materially, but also psychologically.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in this page but isn't
@@ -452,7 +452,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 17:32:38 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/malware-games.de.po  2 Nov 2020 17:32:38 -0000       1.49
+++ proprietary/po/malware-games.de.po  10 Nov 2020 17:37:40 -0000      1.50
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "

Index: proprietary/po/malware-games.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/malware-games.es-en.html     3 Nov 2020 12:00:44 -0000       
1.11
+++ proprietary/po/malware-games.es-en.html     10 Nov 2020 17:37:40 -0000      
1.12
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Among the numerous malicious functionalities that are found in games,
 <a href="/proprietary/proprietary-addictions.html#addictiveness">
 addictiveness</a> may be the worst, because it doesn't only affect users
 materially, but also psychologically.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -400,7 +400,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/03 12:00:44 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/malware-games.es.po  3 Nov 2020 12:00:44 -0000       1.32
+++ proprietary/po/malware-games.es.po  10 Nov 2020 17:37:40 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-11-03 11:47+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -81,7 +81,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "

Index: proprietary/po/malware-games.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-games.fr-en.html     2 Nov 2020 18:03:09 -0000       
1.45
+++ proprietary/po/malware-games.fr-en.html     10 Nov 2020 17:37:40 -0000      
1.46
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Among the numerous malicious functionalities that are found in games,
 <a href="/proprietary/proprietary-addictions.html#addictiveness">
 addictiveness</a> may be the worst, because it doesn't only affect users
 materially, but also psychologically.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -400,7 +400,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/po/malware-games.fr.po  2 Nov 2020 17:49:26 -0000       1.89
+++ proprietary/po/malware-games.fr.po  10 Nov 2020 17:37:40 -0000      1.90
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-11-02 18:46+0100\n"
 "Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "

Index: proprietary/po/malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-games.ja-diff.html   2 Nov 2020 17:32:38 -0000       
1.57
+++ proprietary/po/malware-games.ja-diff.html   10 Nov 2020 17:37:40 -0000      
1.58
@@ -76,14 +76,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Among the numerous malicious functionalities that are 
found</em></ins></span> in <span 
class="inserted"><ins><em>games,</em></ins></span>
 &lt;a
 <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;
 whether</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
 addictiveness&lt;/a&gt; may be</em></ins></span> the <span 
class="inserted"><ins><em>worst, because it doesn't only 
affect</em></ins></span> users <span class="removed"><del><strong>have 
control</strong></del></span>
 <span class="inserted"><ins><em>materially, but also psychologically.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in this page but isn't
@@ -452,7 +452,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 17:32:38 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/malware-games.ja.po  2 Nov 2020 17:32:38 -0000       1.49
+++ proprietary/po/malware-games.ja.po  10 Nov 2020 17:37:40 -0000      1.50
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -99,7 +99,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "

Index: proprietary/po/malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/malware-games.pot    2 Nov 2020 17:32:38 -0000       1.42
+++ proprietary/po/malware-games.pot    10 Nov 2020 17:37:40 -0000      1.43
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "

Index: proprietary/po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-games.ru-en.html     2 Nov 2020 18:03:09 -0000       
1.45
+++ proprietary/po/malware-games.ru-en.html     10 Nov 2020 17:37:40 -0000      
1.46
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Among the numerous malicious functionalities that are found in games,
 <a href="/proprietary/proprietary-addictions.html#addictiveness">
 addictiveness</a> may be the worst, because it doesn't only affect users
 materially, but also psychologically.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -400,7 +400,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/malware-games.ru.po  2 Nov 2020 18:03:09 -0000       1.96
+++ proprietary/po/malware-games.ru.po  10 Nov 2020 17:37:40 -0000      1.97
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/malware-mobiles.de-diff.html 17 Oct 2020 08:05:07 -0000      
1.85
+++ proprietary/po/malware-mobiles.de-diff.html 10 Nov 2020 17:37:40 -0000      
1.86
@@ -87,7 +87,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;Nearly all mobile phones do two grievous wrongs to their users:
 tracking their movements, and listening to their conversations.  This
 is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;
@@ -98,21 +98,21 @@
 Google are listed in dedicated pages, &lt;a
 href="/proprietary/malware-apple.html"&gt;Apple's Operating Systems are
 Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
-Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;</em></ins></span>
-&lt;/div&gt;
+Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;
+&lt;/blockquote&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;div class="important"&gt;
+&lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+to serve as specific substantiation.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;div class="column-limit" id="phone-communications"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;div class="column-limit" 
id="phone-communications"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201502100"&gt;
@@ -286,48 +286,49 @@
     &lt;p&gt;Xiaomi phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
        can be hijacked through their Wi-Fi chips&lt;/a&gt; because 
of</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>bug</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> in
-       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;
+    a <span class="removed"><del><strong>bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Samsung
-phones</strong></del></span> <span class="inserted"><ins><em>the application 
processor, for Xiaomi's
-    use&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This is separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
-a security hole</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>allows an SMS message to install
-ransomware&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the local phone
-    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Many</strong></del></span>
+phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole that allows an SMS message to install
+ransomware&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's</em></ins></span> proprietary <span 
class="removed"><del><strong>payment apps &lt;a
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
 
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data in an insecure way&lt;/a&gt;.
-However, the worse aspect of these apps is</strong></del></span> <span 
class="inserted"><ins><em>Android library, Moplus, has a back 
door</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+transmit personal data</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> in <span 
class="removed"><del><strong>an insecure way&lt;/a&gt;.
+However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps</strong></del></span> <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+    use&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
-    can <span class="removed"><del><strong>tap data in smart phones, including 
iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upload files&rdquo; as well as forcibly install
+  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
+    universal back door</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail here, it 
seems</strong></del></span> <span class="inserted"><ins><em>the modem 
processor</em></ins></span> that <span class="removed"><del><strong>this
+  does not operate via</strong></del></span> the <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has 
a</em></ins></span> back door that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems that this
-  does not operate via the</strong></del></span> <span 
class="inserted"><ins><em>used by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a</em></ins></span> universal back <span 
class="removed"><del><strong>door that we know nearly</strong></del></span> 
<span class="inserted"><ins><em>door&lt;/a&gt;. Nearly</em></ins></span>
+    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
     all
   <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door"&gt;
   lots of bugs</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;
@@ -1617,7 +1618,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/malware-mobiles.de.po        17 Oct 2020 08:05:07 -0000      
1.141
+++ proprietary/po/malware-mobiles.de.po        10 Nov 2020 17:37:40 -0000      
1.142
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -121,7 +121,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -133,7 +133,7 @@
 "are-stalin-s-dream-says-free-software-movement-founder.html\">Stalin's "
 "dream</q>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary/po/malware-mobiles.es-en.html   17 Oct 2020 12:00:47 -0000      
1.75
+++ proprietary/po/malware-mobiles.es-en.html   10 Nov 2020 17:37:40 -0000      
1.76
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Nearly all mobile phones do two grievous wrongs to their users:
 tracking their movements, and listening to their conversations.  This
 is why we call them &ldquo;Stalin's dream&rdquo;.</p>
@@ -65,7 +65,7 @@
 href="/proprietary/malware-apple.html">Apple's Operating Systems are
 Malware</a> and <a href="/proprietary/malware-google.html">Google's
 Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -1283,7 +1283,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 12:00:47 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/malware-mobiles.es.po        17 Oct 2020 12:00:47 -0000      
1.196
+++ proprietary/po/malware-mobiles.es.po        10 Nov 2020 17:37:40 -0000      
1.197
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -93,7 +93,7 @@
 "rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los "
 "llamamos «el sueño de Stalin»."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary/po/malware-mobiles.fr-en.html   17 Oct 2020 08:59:36 -0000      
1.99
+++ proprietary/po/malware-mobiles.fr-en.html   10 Nov 2020 17:37:40 -0000      
1.100
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Nearly all mobile phones do two grievous wrongs to their users:
 tracking their movements, and listening to their conversations.  This
 is why we call them &ldquo;Stalin's dream&rdquo;.</p>
@@ -65,7 +65,7 @@
 href="/proprietary/malware-apple.html">Apple's Operating Systems are
 Malware</a> and <a href="/proprietary/malware-google.html">Google's
 Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -1283,7 +1283,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary/po/malware-mobiles.fr.po        17 Oct 2020 08:29:20 -0000      
1.210
+++ proprietary/po/malware-mobiles.fr.po        10 Nov 2020 17:37:40 -0000      
1.211
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -88,7 +88,7 @@
 "de deux manières : ils suivent leurs mouvements et ils écoutent leurs "
 "conversations. C'est pourquoi nous les appelons « le rêve de Staline »."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/malware-mobiles.it-diff.html 17 Oct 2020 08:05:07 -0000      
1.90
+++ proprietary/po/malware-mobiles.it-diff.html 10 Nov 2020 17:37:40 -0000      
1.91
@@ -102,7 +102,7 @@
 &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
     to restrict what users can</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Nearly all mobile phones</em></ins></span> do <span 
class="removed"><del><strong>with the data in</strong></del></span> <span 
class="inserted"><ins><em>two grievous wrongs to</em></ins></span> their <span 
class="removed"><del><strong>computers.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
@@ -120,28 +120,27 @@
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;The universal back door</strong></del></span> <span 
class="inserted"><ins><em>Apple or Google (including its subsidiaries).
-Malicious functionalities</em></ins></span> in <span 
class="removed"><del><strong>portable phones
-      &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-        is employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;Most</strong></del></span> mobile <span 
class="removed"><del><strong>phones have this universal back door, which has 
been
-      used to</strong></del></span> <span class="inserted"><ins><em>software 
released by Apple or
-Google are listed in dedicated pages,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-       turn them malicious&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;More about</strong></del></span>
+Malicious functionalities</em></ins></span> in <span 
class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>mobile software released by Apple or
+Google are listed in dedicated pages,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is employed</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple's 
Operating Systems are
-Malware&lt;/a&gt; and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google's
+Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
 Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in</em></ins></span> this <span 
class="removed"><del><strong>problem&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>be in</em></ins></span> this <span 
class="removed"><del><strong>universal back door, which has been
+      used</strong></del></span> <span class="inserted"><ins><em>page but isn't
+here, please write</em></ins></span>
+to &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+       turn them malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL</em></ins></span> of <span 
class="removed"><del><strong>this problem&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span> <span class="inserted"><ins><em>page but isn't
-here, please write
-to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a
+  Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span> a
   <span class="removed"><del><strong>back door&lt;/a&gt; that provides remote 
access</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
 to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
@@ -223,19 +222,20 @@
 &lt;ul&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all</strong></del></span> <span 
class="inserted"><ins><em>the
-    back door, but at least it is unable to turn the phone unto a
+  &lt;p&gt;Siri, Alexa, and all</strong></del></span> the <span 
class="removed"><del><strong>other voice-control systems can 
be</strong></del></span>
+    <span class="inserted"><ins><em>back door, but at least it is unable to 
turn the phone unto a
     listening device.&lt;/p&gt;
 
-    &lt;p&gt;The universal back door is apparently also used to make phones 
&lt;a
-    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+    &lt;p&gt;The universal back door is apparently also used to make 
phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
     transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
     are tracked, and may also make the listening feature work.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div id="TOC"&gt;
-&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;
+&lt;h3&gt;Types of malware</em></ins></span> in <span 
class="removed"><del><strong>ultrasound that humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mobiles&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
@@ -257,10 +257,13 @@
   &lt;li id="M209900001"&gt;
     &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general universal back
     door&lt;/a&gt; in essentially all mobile phones, which permits converting
-    them into full-time listening devices.&lt;/p&gt;
+    them into full-time listening devices.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202001090"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202001090"&gt;
     &lt;p&gt;Android phones subsidized by the US government come with &lt;a
     
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
     preinstalled adware and a back door for forcing installation of
@@ -274,30 +277,34 @@
 
     &lt;p&gt;In other words, a program whose raison d'être is malicious has
     a secret secondary malicious purpose. All this is in addition to the
-    malware of Android itself.&lt;/p&gt;
+    malware of</em></ins></span> Android <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908270"&gt;
     &lt;p&gt;A very popular app found in the
-    Google Play store contained a module that was designed to &lt;a
-    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
+    Google Play store contained a module that was designed 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware on the user's computer&lt;/a&gt;. The app developers
     regularly used it to make the computer download and execute any code
     they wanted.&lt;/p&gt;
 
     &lt;p&gt;This is a concrete example of what users are exposed to when they
-    run nonfree apps. They can never be completely sure that a nonfree
-    app is safe.&lt;/p&gt;
+    run nonfree apps. They</em></ins></span> can <span 
class="inserted"><ins><em>never</em></ins></span> be <span 
class="removed"><del><strong>hijacked through their Wi-Fi chips&lt;/a&gt; 
because of</strong></del></span> <span class="inserted"><ins><em>completely 
sure that</em></ins></span> a <span class="removed"><del><strong>bug in
+       Broadcom's non-free firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree
+    app is safe.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609130"&gt;
-    &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
-    a universal back door in the application processor, for Xiaomi's
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609130"&gt;
+    &lt;p&gt;Xiaomi</em></ins></span> phones <span 
class="inserted"><ins><em>come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>security hole</strong></del></span> 
<span class="inserted"><ins><em>universal back door in the application 
processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
+    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>allows an SMS message</strong></del></span> <span 
class="inserted"><ins><em>the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -958,7 +965,7 @@
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the other <span 
class="removed"><del><strong>voice-control systems</strong></del></span> <span 
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
@@ -976,51 +983,41 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we</em></ins></span> can <span 
class="removed"><del><strong>be</strong></del></span> <span 
class="inserted"><ins><em>depend on each other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>play 
commands in ultrasound</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope</em></ins></span> that 
<span class="removed"><del><strong>humans can't hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234</em></ins></span> Android <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>apps that track users by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be hijacked through their Wi-Fi chips&lt;/a&gt; 
because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots</em></ins></span> of <span 
class="removed"><del><strong>a bug</strong></del></span> <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data</em></ins></span> in
-       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung
-phones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span 
class="removed"><del><strong>security hole</strong></del></span> <span 
class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>allows an SMS message</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>install
@@ -1627,7 +1624,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/malware-mobiles.it.po        17 Oct 2020 08:05:07 -0000      
1.141
+++ proprietary/po/malware-mobiles.it.po        10 Nov 2020 17:37:40 -0000      
1.142
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -118,14 +118,14 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/malware-mobiles.ja-diff.html 17 Oct 2020 08:05:07 -0000      
1.108
+++ proprietary/po/malware-mobiles.ja-diff.html 10 Nov 2020 17:37:40 -0000      
1.109
@@ -79,20 +79,31 @@
 runs.  However, in practice nonfree software</strong></del></span> <span 
class="inserted"><ins><em>users; &lt;a
 
href="/philosophy/free-software-even-more-important.html"&gt;that</em></ins></span>
 is <span class="removed"><del><strong>often malware, 
because</strong></del></span> the <span 
class="removed"><del><strong>developer's awareness</strong></del></span>
 <span class="inserted"><ins><em>basic injustice&lt;/a&gt;. The developers and 
manufacturers often exercise</em></ins></span>
-that <span class="removed"><del><strong>the users would be 
powerless</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> to <span 
class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> the <span 
class="removed"><del><strong>developer to impose some.
+that <span class="inserted"><ins><em>power to the detriment 
of</em></ins></span> the users <span class="removed"><del><strong>would be 
powerless</strong></del></span> <span class="inserted"><ins><em>they 
ought</em></ins></span> to <span class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> <span 
class="inserted"><ins><em>serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes</em></ins></span> the <span 
class="removed"><del><strong>developer to impose some.
 &lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Here are examples</strong></del></span> <span 
class="inserted"><ins><em>detriment</em></ins></span> of <span 
class="removed"><del><strong>malware in mobile devices.  See 
also</strong></del></span> the <span class="removed"><del><strong>&lt;a 
href="/proprietary/malware-apple.html"&gt;the Apple malware
-page&lt;/a&gt; for malicious functionalities specific</strong></del></span> 
<span class="inserted"><ins><em>users they ought</em></ins></span> to <span 
class="inserted"><ins><em>serve.&lt;/p&gt;
-
-&lt;p&gt;This typically takes</em></ins></span> the <span 
class="removed"><del><strong>Apple iThings.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>form of malicious functionalities.&lt;/p&gt;
+&lt;p&gt;Here are examples</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="inserted"><ins><em>malicious functionalities.&lt;/p&gt;
 &lt;hr class="full-width" /&gt;
-&lt;/div&gt;</em></ins></span>
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote&gt;
+&lt;p&gt;Nearly all mobile phones do two grievous wrongs to their users:
+tracking their movements, and listening to their conversations.  This
+is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;
 
-&lt;div <span 
class="removed"><del><strong>class="toc"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;</em></ins></span>
-&lt;div <span class="removed"><del><strong>class="malfunctions"&gt;
+&lt;p&gt;The</em></ins></span> malware <span class="inserted"><ins><em>we list 
here is present</em></ins></span> in <span class="removed"><del><strong>mobile 
devices.  See also
+the &lt;a href="/proprietary/malware-apple.html"&gt;the</strong></del></span> 
<span class="inserted"><ins><em>every phone, or in software
+that is not made by</em></ins></span> Apple <span 
class="removed"><del><strong>malware
+page&lt;/a&gt; for malicious</strong></del></span> <span 
class="inserted"><ins><em>or Google (including its subsidiaries).
+Malicious</em></ins></span> functionalities <span 
class="removed"><del><strong>specific to the</strong></del></span> <span 
class="inserted"><ins><em>in mobile software released by</em></ins></span> 
Apple <span class="removed"><del><strong>iThings.&lt;/p&gt;
+
+&lt;div class="toc"&gt;
+&lt;div class="malfunctions"&gt;
 &lt;ul&gt;
 &lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
@@ -102,33 +113,27 @@
 &lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
-    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can</strong></del></span> <span 
class="inserted"><ins><em>class="italic"&gt;
-&lt;p&gt;Nearly all mobile phones</em></ins></span> do <span 
class="removed"><del><strong>with the data in</strong></del></span> <span 
class="inserted"><ins><em>two grievous wrongs to</em></ins></span> their <span 
class="removed"><del><strong>computers.&lt;/li&gt;
+    management&lt;/a&gt;</strong></del></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data</strong></del></span>
+<span class="inserted"><ins><em>Google are listed</em></ins></span> in <span 
class="removed"><del><strong>their computers.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>users:
-tracking their movements, and listening to their conversations.  This
-is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;
+&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>dedicated pages, &lt;a
+href="/proprietary/malware-apple.html"&gt;Apple's Operating Systems are
+Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
+Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;
+&lt;/blockquote&gt;
 
-&lt;p&gt;The malware we list here is present in every phone, or in 
software</em></ins></span>
-that <span class="removed"><del><strong>reject any operating 
system</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> not <span 
class="removed"><del><strong>&ldquo;authorized&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>made</em></ins></span> by <span 
class="removed"><del><strong>the
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system not 
&ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
-&lt;/div&gt;</strong></del></span> <span class="inserted"><ins><em>Apple or 
Google (including its subsidiaries).
-Malicious functionalities in mobile software released by Apple or
-Google are listed in dedicated pages, &lt;a
-href="/proprietary/malware-apple.html"&gt;Apple's Operating Systems are
-Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
-Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;</em></ins></span>
+&lt;/div&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;h3 id="back-doors"&gt;Mobile Back 
Doors&lt;/h3&gt;
+&lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The universal back door</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be</em></ins></span> in <span 
class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>this page but isn't
+  &lt;li&gt;&lt;p&gt;The universal back door</strong></del></span> <span 
class="inserted"><ins><em>ought to be</em></ins></span> in <span 
class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>this page but isn't
 here, please write
 to</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
@@ -1473,7 +1478,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary/po/malware-mobiles.ja.po        17 Oct 2020 08:05:07 -0000      
1.132
+++ proprietary/po/malware-mobiles.ja.po        10 Nov 2020 17:37:40 -0000      
1.133
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,14 +100,14 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-mobiles.pot  17 Oct 2020 08:05:07 -0000      1.107
+++ proprietary/po/malware-mobiles.pot  10 Nov 2020 17:37:40 -0000      1.108
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,14 +68,14 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.ru-en.html   19 Oct 2020 10:00:05 -0000      
1.102
+++ proprietary/po/malware-mobiles.ru-en.html   10 Nov 2020 17:37:40 -0000      
1.103
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Nearly all mobile phones do two grievous wrongs to their users:
 tracking their movements, and listening to their conversations.  This
 is why we call them &ldquo;Stalin's dream&rdquo;.</p>
@@ -65,7 +65,7 @@
 href="/proprietary/malware-apple.html">Apple's Operating Systems are
 Malware</a> and <a href="/proprietary/malware-google.html">Google's
 Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -1283,7 +1283,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/malware-mobiles.ru.po        19 Oct 2020 10:00:05 -0000      
1.248
+++ proprietary/po/malware-mobiles.ru.po        10 Nov 2020 17:37:40 -0000      
1.249
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -89,7 +89,7 @@
 "пользователям: отслеживают их 
перемещения и прослушивают их переговоры. 
Вот "
 "почему мы называем их &ldquo;мечтой 
Сталина&rdquo;."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "

Index: proprietary/po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/malware-webpages.de-diff.html        24 Jun 2020 05:37:10 
-0000      1.30
+++ proprietary/po/malware-webpages.de-diff.html        10 Nov 2020 17:37:40 
-0000      1.31
@@ -87,7 +87,7 @@
 &lt;/div&gt;
 
 <span class="inserted"><ins><em>&lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;This page lists web sites containing proprietary JavaScript programs 
that spy
 on users or mislead them. They make use of what we call
 the &lt;a href="/philosophy/javascript-trap.html"&gt;JavaScript 
Trap&lt;/a&gt;. Of course,
@@ -96,7 +96,7 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -160,10 +160,11 @@
   &lt;li id="M201712300"&gt;
     &lt;p&gt;Some JavaScript malware &lt;a
     
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
-    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+    swipes usernames from browser-based password 
managers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201711150"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711150"&gt;
     &lt;p&gt;Some websites send
     JavaScript code to collect all the user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
@@ -178,11 +179,10 @@
     for comments, the proprietary Disqus software &lt;a
     
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
     a Facebook software package into the browser of every anonymous visitor
-    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612064"&gt;
+  &lt;li id="M201612064"&gt;
     &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
     businesses to show different people different prices&lt;/a&gt;. Most of
@@ -332,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-webpages.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/malware-webpages.de.po       24 Jun 2020 05:37:10 -0000      
1.20
+++ proprietary/po/malware-webpages.de.po       10 Nov 2020 17:37:40 -0000      
1.21
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -121,7 +121,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"

Index: proprietary/po/malware-webpages.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-webpages.es-en.html  24 Jun 2020 05:37:10 -0000      
1.3
+++ proprietary/po/malware-webpages.es-en.html  10 Nov 2020 17:37:40 -0000      
1.4
@@ -53,13 +53,13 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists web sites containing proprietary JavaScript programs that 
spy
 on users or mislead them. They make use of what we call
 the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
 many sites collect information that the user sends, via forms or otherwise, but
 here we're not talking about that.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -285,7 +285,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-webpages.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/malware-webpages.es.po       24 Jun 2020 05:37:10 -0000      
1.9
+++ proprietary/po/malware-webpages.es.po       10 Nov 2020 17:37:40 -0000      
1.10
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-22 11:17+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -80,7 +80,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"

Index: proprietary/po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/malware-webpages.fr-en.html  24 Jun 2020 05:37:10 -0000      
1.20
+++ proprietary/po/malware-webpages.fr-en.html  10 Nov 2020 17:37:40 -0000      
1.21
@@ -53,13 +53,13 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists web sites containing proprietary JavaScript programs that 
spy
 on users or mislead them. They make use of what we call
 the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
 many sites collect information that the user sends, via forms or otherwise, but
 here we're not talking about that.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -285,7 +285,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-webpages.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-webpages.fr.po       5 Oct 2020 13:13:25 -0000       
1.33
+++ proprietary/po/malware-webpages.fr.po       10 Nov 2020 17:37:40 -0000      
1.34
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"

Index: proprietary/po/malware-webpages.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/malware-webpages.pot 24 Jun 2020 05:37:10 -0000      1.17
+++ proprietary/po/malware-webpages.pot 10 Nov 2020 17:37:40 -0000      1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a "

Index: proprietary/po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/malware-webpages.ru-en.html  24 Jun 2020 05:37:10 -0000      
1.21
+++ proprietary/po/malware-webpages.ru-en.html  10 Nov 2020 17:37:40 -0000      
1.22
@@ -53,13 +53,13 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists web sites containing proprietary JavaScript programs that 
spy
 on users or mislead them. They make use of what we call
 the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
 many sites collect information that the user sends, via forms or otherwise, but
 here we're not talking about that.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -285,7 +285,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/malware-webpages.ru.po       24 Jun 2020 05:37:10 -0000      
1.40
+++ proprietary/po/malware-webpages.ru.po       10 Nov 2020 17:37:40 -0000      
1.41
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary/po/nl.po        10 Nov 2020 16:02:01 -0000      1.231
+++ proprietary/po/nl.po        10 Nov 2020 17:37:40 -0000      1.232
@@ -3554,7 +3554,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -5189,14 +5189,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -6481,7 +6481,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6666,7 +6666,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -6777,7 +6777,7 @@
 msgid "Proprietary Addictions"
 msgstr "Apple-achterdeuren"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -7034,7 +7034,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Apple-achterdeuren"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -7289,7 +7289,7 @@
 msgid "Proprietary Censorship"
 msgstr "Apple-censuur"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -7298,7 +7298,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -7350,7 +7350,7 @@
 msgid "Proprietary Coverups"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -7377,7 +7377,7 @@
 msgid "Proprietary Deception"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -7440,7 +7440,7 @@
 msgid "Proprietary DRM"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -7448,7 +7448,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -7531,7 +7531,7 @@
 msgid "Proprietary Fraud"
 msgstr "Apple-achterdeuren"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -7560,13 +7560,13 @@
 msgid "Proprietary Incompatibility"
 msgstr "Apple-onveiligheid"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -7574,7 +7574,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -7582,7 +7582,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -7590,7 +7590,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7622,7 +7622,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Apple-onveiligheid"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7631,7 +7631,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7744,7 +7744,7 @@
 msgid "Proprietary Interference"
 msgstr "Apple-inmenging"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Various-]{+One kind of malicious functionality mediates developer's
 # | interference into the use of the software. This page describes how
 # | various+} proprietary programs [-often mess up-] {+harass or annoy the
@@ -7817,7 +7817,7 @@
 msgid "Proprietary Jails"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -7825,14 +7825,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -7885,14 +7885,14 @@
 msgid "Proprietary Manipulation"
 msgstr "Apple-achterdeuren"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7914,13 +7914,13 @@
 msgid "Proprietary Obsolescence"
 msgstr "Apple-inmenging"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -7928,7 +7928,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -8465,7 +8465,7 @@
 msgid "Proprietary Sabotage"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -8580,7 +8580,7 @@
 msgid "Proprietary Subscriptions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -8590,7 +8590,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -8625,7 +8625,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -8634,7 +8634,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -9421,7 +9421,7 @@
 msgid "Proprietary Tethers"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -9429,7 +9429,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -9448,7 +9448,7 @@
 msgid "Proprietary Tyrants"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/pl.po        10 Nov 2020 16:02:01 -0000      1.230
+++ proprietary/po/pl.po        10 Nov 2020 17:37:40 -0000      1.231
@@ -3128,7 +3128,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4670,14 +4670,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -5945,7 +5945,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6126,7 +6126,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -6235,7 +6235,7 @@
 msgid "Proprietary Addictions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -6490,7 +6490,7 @@
 msgid "Proprietary Back Doors"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -6747,7 +6747,7 @@
 msgid "Proprietary Censorship"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -6756,7 +6756,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -6806,7 +6806,7 @@
 msgid "Proprietary Coverups"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -6834,7 +6834,7 @@
 msgid "Proprietary Deception"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -6898,7 +6898,7 @@
 msgid "Proprietary DRM"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6906,7 +6906,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6987,7 +6987,7 @@
 msgid "Proprietary Fraud"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -7014,13 +7014,13 @@
 msgid "Proprietary Incompatibility"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -7028,7 +7028,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -7036,7 +7036,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -7044,7 +7044,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7074,7 +7074,7 @@
 msgid "Proprietary Insecurity"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7083,7 +7083,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7193,7 +7193,7 @@
 msgid "Proprietary Interference"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -7246,7 +7246,7 @@
 msgid "Proprietary Jails"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -7254,14 +7254,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -7308,14 +7308,14 @@
 msgid "Proprietary Manipulation"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7335,13 +7335,13 @@
 msgid "Proprietary Obsolescence"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -7349,7 +7349,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -7969,7 +7969,7 @@
 msgid "Proprietary Sabotage"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -8085,7 +8085,7 @@
 msgid "Proprietary Subscriptions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -8095,7 +8095,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -8128,7 +8128,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -8137,7 +8137,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -8908,7 +8908,7 @@
 msgid "Proprietary Tethers"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -8916,7 +8916,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -8936,7 +8936,7 @@
 msgid "Proprietary Tyrants"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary/po/pot  10 Nov 2020 16:02:03 -0000      1.229
+++ proprietary/po/pot  10 Nov 2020 17:37:40 -0000      1.230
@@ -2898,7 +2898,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4397,14 +4397,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -5652,7 +5652,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -5823,7 +5823,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -5927,7 +5927,7 @@
 msgid "Proprietary Addictions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -6173,7 +6173,7 @@
 msgid "Proprietary Back Doors"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -6406,7 +6406,7 @@
 msgid "Proprietary Censorship"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -6415,7 +6415,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -6460,7 +6460,7 @@
 msgid "Proprietary Coverups"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -6483,7 +6483,7 @@
 msgid "Proprietary Deception"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -6543,7 +6543,7 @@
 msgid "Proprietary DRM"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6551,7 +6551,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6628,7 +6628,7 @@
 msgid "Proprietary Fraud"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -6650,13 +6650,13 @@
 msgid "Proprietary Incompatibility"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -6664,7 +6664,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -6672,7 +6672,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -6680,7 +6680,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -6701,7 +6701,7 @@
 msgid "Proprietary Insecurity"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -6710,7 +6710,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -6811,7 +6811,7 @@
 msgid "Proprietary Interference"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -6860,7 +6860,7 @@
 msgid "Proprietary Jails"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -6868,14 +6868,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -6913,14 +6913,14 @@
 msgid "Proprietary Manipulation"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -6935,13 +6935,13 @@
 msgid "Proprietary Obsolescence"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -6949,7 +6949,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -7265,7 +7265,7 @@
 msgid "Proprietary Sabotage"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -7376,7 +7376,7 @@
 msgid "Proprietary Subscriptions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -7386,7 +7386,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -7414,7 +7414,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -7423,7 +7423,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -8126,7 +8126,7 @@
 msgid "Proprietary Tethers"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -8134,7 +8134,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -8149,7 +8149,7 @@
 msgid "Proprietary Tyrants"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/potential-malware.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/potential-malware.de-diff.html       24 Jun 2020 05:37:10 
-0000      1.8
+++ proprietary/po/potential-malware.de-diff.html       10 Nov 2020 17:37:40 
-0000      1.9
@@ -65,14 +65,15 @@
 
 &lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
 &lt;hr class="full-width" /&gt;
-&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
-&lt;div class="article"&gt;</em></ins></span>
-&lt;div <span 
class="removed"><del><strong>class="comment"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="italic"&gt;</em></ins></span>
+&lt;div <span 
class="removed"><del><strong>class="comment"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;
+&lt;blockquote&gt;</em></ins></span>
   &lt;p&gt;This page describes malicious techniques that proprietary
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.&lt;/p&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/blockquote&gt;</em></ins></span>
 &lt;div class="column-limit" id="potential-malware"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -207,7 +208,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/potential-malware.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/potential-malware.de.po      24 Jun 2020 05:37:10 -0000      
1.14
+++ proprietary/po/potential-malware.de.po      10 Nov 2020 17:37:40 -0000      
1.15
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "

Index: proprietary/po/potential-malware.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/potential-malware.es-en.html 24 Jun 2020 05:37:10 -0000      
1.3
+++ proprietary/po/potential-malware.es-en.html 10 Nov 2020 17:37:40 -0000      
1.4
@@ -53,11 +53,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>This page describes malicious techniques that proprietary
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
-</div>
+</blockquote>
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
@@ -188,7 +188,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/potential-malware.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/potential-malware.es.po      24 Jun 2020 05:37:10 -0000      
1.7
+++ proprietary/po/potential-malware.es.po      10 Nov 2020 17:37:40 -0000      
1.8
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-22 11:19+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "

Index: proprietary/po/potential-malware.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/potential-malware.fr-en.html 24 Jun 2020 05:37:10 -0000      
1.17
+++ proprietary/po/potential-malware.fr-en.html 10 Nov 2020 17:37:40 -0000      
1.18
@@ -53,11 +53,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>This page describes malicious techniques that proprietary
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
-</div>
+</blockquote>
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
@@ -188,7 +188,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/potential-malware.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/potential-malware.fr.po      5 Oct 2020 13:13:25 -0000       
1.22
+++ proprietary/po/potential-malware.fr.po      10 Nov 2020 17:37:40 -0000      
1.23
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "

Index: proprietary/po/potential-malware.pot
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.pot,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/potential-malware.pot        24 Jun 2020 05:37:10 -0000      
1.11
+++ proprietary/po/potential-malware.pot        10 Nov 2020 17:37:40 -0000      
1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "

Index: proprietary/po/potential-malware.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/potential-malware.ru-en.html 24 Jun 2020 05:37:10 -0000      
1.17
+++ proprietary/po/potential-malware.ru-en.html 10 Nov 2020 17:37:40 -0000      
1.18
@@ -53,11 +53,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>This page describes malicious techniques that proprietary
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
-</div>
+</blockquote>
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
@@ -188,7 +188,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/potential-malware.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/potential-malware.ru.po      24 Jun 2020 05:04:03 -0000      
1.26
+++ proprietary/po/potential-malware.ru.po      10 Nov 2020 17:37:40 -0000      
1.27
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "

Index: proprietary/po/proprietary-addictions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-addictions.es-en.html    29 Oct 2020 11:29:54 
-0000      1.18
+++ proprietary/po/proprietary-addictions.es-en.html    10 Nov 2020 17:37:40 
-0000      1.19
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page deals with malicious functionalities that are added to
 some programs for the sole purpose of luring users into more and more
 frequent and intensive use of the program, with the risk of getting
 addicted.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/29 11:29:54 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/po/proprietary-addictions.es.po 29 Oct 2020 11:29:54 -0000      
1.56
+++ proprietary/po/proprietary-addictions.es.po 10 Nov 2020 17:37:40 -0000      
1.57
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "

Index: proprietary/po/proprietary-addictions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-addictions.fr-en.html    29 Oct 2020 09:00:32 
-0000      1.24
+++ proprietary/po/proprietary-addictions.fr-en.html    10 Nov 2020 17:37:40 
-0000      1.25
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page deals with malicious functionalities that are added to
 some programs for the sole purpose of luring users into more and more
 frequent and intensive use of the program, with the risk of getting
 addicted.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/29 09:00:32 $
+$Date: 2020/11/10 17:37:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-addictions.fr.po 29 Oct 2020 08:51:33 -0000      
1.58
+++ proprietary/po/proprietary-addictions.fr.po 10 Nov 2020 17:37:40 -0000      
1.59
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-10-29 09:49+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -77,7 +77,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "

Index: proprietary/po/proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-addictions.pot   28 Oct 2020 23:00:58 -0000      
1.28
+++ proprietary/po/proprietary-addictions.pot   10 Nov 2020 17:37:40 -0000      
1.29
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "

Index: proprietary/po/proprietary-addictions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-addictions.ru-en.html    29 Oct 2020 11:00:28 
-0000      1.24
+++ proprietary/po/proprietary-addictions.ru-en.html    10 Nov 2020 17:37:41 
-0000      1.25
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page deals with malicious functionalities that are added to
 some programs for the sole purpose of luring users into more and more
 frequent and intensive use of the program, with the risk of getting
 addicted.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/29 11:00:28 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-addictions.ru.po 29 Oct 2020 11:00:28 -0000      
1.55
+++ proprietary/po/proprietary-addictions.ru.po 10 Nov 2020 17:37:41 -0000      
1.56
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "

Index: proprietary/po/proprietary-addictions.tr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-addictions.tr-en.html    29 Oct 2020 17:01:53 
-0000      1.5
+++ proprietary/po/proprietary-addictions.tr-en.html    10 Nov 2020 17:37:41 
-0000      1.6
@@ -53,12 +53,12 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page deals with malicious functionalities that are added to
 some programs for the sole purpose of luring users into more and more
 frequent and intensive use of the program, with the risk of getting
 addicted.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/29 17:01:53 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-addictions.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-addictions.tr.po 29 Oct 2020 17:01:53 -0000      
1.23
+++ proprietary/po/proprietary-addictions.tr.po 10 Nov 2020 17:37:41 -0000      
1.24
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-10-29 17:46+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -77,7 +77,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Bu genellikle kötücül işlevsellikler biçimini alır."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "

Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-back-doors.de-diff.html  17 Oct 2020 08:05:08 
-0000      1.47
+++ proprietary/po/proprietary-back-doors.de-diff.html  10 Nov 2020 17:37:41 
-0000      1.48
@@ -68,7 +68,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Some malicious functionalities are mediated by &lt;a
 href="/proprietary/proprietary.html#f1"&gt;back doors&lt;/a&gt;.  
Here</em></ins></span> are
 examples of <span class="removed"><del><strong>demonstrated back doors in 
proprietary software.
@@ -77,7 +77,7 @@
 Back doors that allow full control over the <span 
class="removed"><del><strong>operating system</strong></del></span> <span 
class="inserted"><ins><em>programs which contain them</em></ins></span>
 are said to be
 <span 
class="removed"><del><strong>&ldquo;universal&rdquo;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;universal.&rdquo;&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -365,7 +365,7 @@
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware on</em></ins></span> the <span 
class="removed"><del><strong>article for the facts</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;. The app developers
     regularly used</em></ins></span> it <span 
class="removed"><del><strong>presents. It is too bad
-      that</strong></del></span> <span class="inserted"><ins><em>to 
make</em></ins></span> the <span class="removed"><del><strong>article 
finishes</strong></del></span> <span class="inserted"><ins><em>computer 
download and execute any code
+      that</strong></del></span> <span class="inserted"><ins><em>to 
make</em></ins></span> the <span class="removed"><del><strong>article finishes 
by advocating</strong></del></span> <span class="inserted"><ins><em>computer 
download and execute any code
     they wanted.&lt;/p&gt;
 
     &lt;p&gt;This is a concrete example of what users are exposed to when they
@@ -428,7 +428,7 @@
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
-    is too bad that the article finishes</em></ins></span> by advocating the
+    is too bad that the article finishes by advocating</em></ins></span> the
     moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
@@ -455,7 +455,7 @@
     door&lt;/a&gt;, Windows 8</em></ins></span> has a back door <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>for &lt;a
     
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely <span class="removed"><del><strong>delete apps.&lt;/a&gt;  (It 
was in a
-      program called GTalkService, which</strong></del></span> <span 
class="inserted"><ins><em>deleting apps&lt;/a&gt;.&lt;/p&gt;
+      program called</strong></del></span> <span 
class="inserted"><ins><em>deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
@@ -468,7 +468,7 @@
     &lt;p&gt;In Android, &lt;a
     
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
     Google has a back door to remotely delete apps&lt;/a&gt;. (It was in a
-    program called GTalkService, which</em></ins></span> seems since then to 
have been
+    program called</em></ins></span> GTalkService, which seems since then to 
have been
     merged into Google Play.)&lt;/p&gt;
 
     &lt;p&gt;Google can also &lt;a
@@ -953,7 +953,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary-back-doors.de.po 17 Oct 2020 08:05:08 -0000      
1.144
+++ proprietary/po/proprietary-back-doors.de.po 10 Nov 2020 17:37:41 -0000      
1.145
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | {+Some malicious functionalities are mediated by <a
 # | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+}  Here are
 # | examples of [-demonstrated back doors in proprietary software.  They are

Index: proprietary/po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-back-doors.es-en.html    18 Oct 2020 09:59:20 
-0000      1.21
+++ proprietary/po/proprietary-back-doors.es-en.html    10 Nov 2020 17:37:41 
-0000      1.22
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Some malicious functionalities are mediated by <a
 href="/proprietary/proprietary.html#f1">back doors</a>.  Here are
 examples of programs that contain one or several of those, classified
 according to what the back door is known to have the power to do.
 Back doors that allow full control over the programs which contain them
 are said to be &ldquo;universal.&rdquo;</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -731,7 +731,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary-back-doors.es.po 18 Oct 2020 09:51:17 -0000      
1.46
+++ proprietary/po/proprietary-back-doors.es.po 10 Nov 2020 17:37:41 -0000      
1.47
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-10-18 11:12+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/po/proprietary-back-doors.fr-en.html    17 Oct 2020 08:59:36 
-0000      1.81
+++ proprietary/po/proprietary-back-doors.fr-en.html    10 Nov 2020 17:37:41 
-0000      1.82
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Some malicious functionalities are mediated by <a
 href="/proprietary/proprietary.html#f1">back doors</a>.  Here are
 examples of programs that contain one or several of those, classified
 according to what the back door is known to have the power to do.
 Back doors that allow full control over the programs which contain them
 are said to be &ldquo;universal.&rdquo;</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -731,7 +731,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/proprietary-back-doors.fr.po 17 Oct 2020 08:29:20 -0000      
1.168
+++ proprietary/po/proprietary-back-doors.fr.po 10 Nov 2020 17:37:41 -0000      
1.169
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "

Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-back-doors.it-diff.html  17 Oct 2020 08:05:08 
-0000      1.73
+++ proprietary/po/proprietary-back-doors.it-diff.html  10 Nov 2020 17:37:41 
-0000      1.74
@@ -68,14 +68,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Some malicious functionalities are mediated by &lt;a
 href="/proprietary/proprietary.html#f1"&gt;back doors&lt;/a&gt;.  
Here</em></ins></span> are
 examples of <span 
class="removed"><del><strong>demonstrated</strong></del></span> <span 
class="inserted"><ins><em>programs that contain one or several of those, 
classified
 according to what the</em></ins></span> back <span 
class="inserted"><ins><em>door is known to have the power to do.
 Back</em></ins></span> doors <span class="inserted"><ins><em>that allow full 
control over the programs which contain them
 are said to be &ldquo;universal.&rdquo;&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be</em></ins></span> in <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
@@ -156,15 +156,16 @@
 
   &lt;li <span 
class="removed"><del><strong>id="chrome-erase-addons"&gt;&lt;p&gt;Chrome</strong></del></span>
 <span class="inserted"><ins><em>id="M201512280"&gt;
     &lt;p&gt;Microsoft</em></ins></span> has <span 
class="removed"><del><strong>a back door</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
-    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
-    backdoored its disk encryption&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;WhatsApp</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+    backdoored its disk encryption&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+  &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;has
         a back door that the company can use to read</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
@@ -1013,7 +1014,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/proprietary-back-doors.it.po 17 Oct 2020 08:05:08 -0000      
1.136
+++ proprietary/po/proprietary-back-doors.it.po 10 Nov 2020 17:37:41 -0000      
1.137
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "

Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary-back-doors.ja-diff.html  17 Oct 2020 08:05:08 
-0000      1.74
+++ proprietary/po/proprietary-back-doors.ja-diff.html  10 Nov 2020 17:37:41 
-0000      1.75
@@ -68,14 +68,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Some malicious functionalities are mediated by &lt;a
 href="/proprietary/proprietary.html#f1"&gt;back doors&lt;/a&gt;.  
Here</em></ins></span> are
 examples of <span 
class="removed"><del><strong>demonstrated</strong></del></span> <span 
class="inserted"><ins><em>programs that contain one or several of those, 
classified
 according to what the</em></ins></span> back <span 
class="inserted"><ins><em>door is known to have the power to do.
 Back</em></ins></span> doors <span class="inserted"><ins><em>that allow full 
control over the programs which contain them
 are said to be &ldquo;universal.&rdquo;&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be</em></ins></span> in <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
@@ -972,7 +972,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary-back-doors.ja.po 17 Oct 2020 08:05:08 -0000      
1.120
+++ proprietary/po/proprietary-back-doors.ja.po 10 Nov 2020 17:37:41 -0000      
1.121
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of demonstrated back doors in proprietary software."

Index: proprietary/po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/proprietary-back-doors.pot   17 Oct 2020 08:05:08 -0000      
1.85
+++ proprietary/po/proprietary-back-doors.pot   10 Nov 2020 17:37:41 -0000      
1.86
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a "
 "href=\"/proprietary/proprietary.html#f1\">back doors</a>.  Here are examples "

Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/proprietary-back-doors.ru-en.html    19 Oct 2020 10:00:05 
-0000      1.83
+++ proprietary/po/proprietary-back-doors.ru-en.html    10 Nov 2020 17:37:41 
-0000      1.84
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Some malicious functionalities are mediated by <a
 href="/proprietary/proprietary.html#f1">back doors</a>.  Here are
 examples of programs that contain one or several of those, classified
 according to what the back door is known to have the power to do.
 Back doors that allow full control over the programs which contain them
 are said to be &ldquo;universal.&rdquo;</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -731,7 +731,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary/po/proprietary-back-doors.ru.po 19 Oct 2020 10:00:05 -0000      
1.212
+++ proprietary/po/proprietary-back-doors.ru.po 10 Nov 2020 17:37:41 -0000      
1.213
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "

Index: proprietary/po/proprietary-censorship.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-censorship.de-diff.html  10 Nov 2020 13:02:57 
-0000      1.8
+++ proprietary/po/proprietary-censorship.de-diff.html  10 Nov 2020 17:37:41 
-0000      1.9
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;One kind of malicious functionality is</em></ins></span> censorship 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> what <span 
class="removed"><del><strong>their</strong></del></span>
 users can access.  <span class="inserted"><ins><em>Here are examples of 
programs which do this.</em></ins></span>
 We have a &lt;a
@@ -78,7 +78,7 @@
 &lt;p&gt;Selling products designed as platforms for a
 company to impose censorship ought to be forbidden by law, but it
 isn't.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;/blockquote&gt;</em></ins></span>
 
 &lt;div <span class="removed"><del><strong>class="important" 
style="margin-bottom: 2em"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -229,7 +229,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/10 13:02:57 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-censorship.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-censorship.de.po 10 Nov 2020 13:02:57 -0000      
1.54
+++ proprietary/po/proprietary-censorship.de.po 10 Nov 2020 17:37:41 -0000      
1.55
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
@@ -151,7 +151,7 @@
 "Installation von Anwenderprogrammen zensieren (wir nennen sie "
 "<em>Gefängnisse</em>)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-censorship.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.es.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-censorship.es.po 10 Nov 2020 13:02:57 -0000      
1.58
+++ proprietary/po/proprietary-censorship.es.po 10 Nov 2020 17:37:41 -0000      
1.59
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-20 12:43+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -96,7 +96,7 @@
 "privativos que censuran la instalación</a> de programas de aplicación (los "
 "llamamos «prisiones»)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-censorship.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-censorship.fr.po 10 Nov 2020 13:02:57 -0000      
1.61
+++ proprietary/po/proprietary-censorship.fr.po 10 Nov 2020 17:37:41 -0000      
1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -92,7 +92,7 @@
 "\">liste distincte des systèmes privateurs qui censurent l'installation</a> "
 "d'applications (on les appelle les &ldquo;prisons&rdquo;.)"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-censorship.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-censorship.it-diff.html  10 Nov 2020 13:02:57 
-0000      1.28
+++ proprietary/po/proprietary-censorship.it-diff.html  10 Nov 2020 17:37:41 
-0000      1.29
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;One kind of malicious functionality is</em></ins></span> censorship 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> what <span 
class="removed"><del><strong>their</strong></del></span>
 users can access.  <span class="inserted"><ins><em>Here are examples of 
programs which do this.</em></ins></span>
 We have a &lt;a
@@ -83,7 +83,7 @@
   &lt;li&gt;&lt;p&gt;Chrome
       &lt;a href="https://support.google.com/chrome/answer/6261569?hl=en"&gt;
        censors downloads</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>software&lt;/a&gt;.&lt;/p&gt;
@@ -122,14 +122,14 @@
 The</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701180"&gt;
-    &lt;p&gt;On Windows and MacOS, Chrome &lt;a
-    
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq"&gt;
+    &lt;p&gt;On Windows and MacOS, Chrome</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"&gt;Nintendo</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq"&gt;
     disables extensions&lt;/a&gt; that are not hosted in the Chrome Web
     Store.&lt;/p&gt;
 
-    &lt;p&gt;For example, an extension was</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"&gt;Nintendo</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;
+    &lt;p&gt;For example, an extension was &lt;a
+    
href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;
     banned from the Chrome Web Store, and permanently disabled&lt;/a&gt; on
     more than 40,000 computers.&lt;/p&gt;
   &lt;/li&gt;
@@ -245,7 +245,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/10 13:02:57 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary-censorship.it.po 10 Nov 2020 13:02:57 -0000      
1.57
+++ proprietary/po/proprietary-censorship.it.po 10 Nov 2020 17:37:41 -0000      
1.58
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2017-07-06 22:33+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
@@ -145,7 +145,7 @@
 "proprietari che censurano l'installazione</a> di programmi (che chiamiamo "
 "&ldquo;prigioni&rdquo;)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-censorship.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-censorship.ja-diff.html  10 Nov 2020 13:02:57 
-0000      1.34
+++ proprietary/po/proprietary-censorship.ja-diff.html  10 Nov 2020 17:37:41 
-0000      1.35
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;One kind of malicious functionality is</em></ins></span> censorship 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> what <span 
class="removed"><del><strong>their</strong></del></span>
 users can access.  <span class="inserted"><ins><em>Here are examples of 
programs which do this.</em></ins></span>
 We have a &lt;a
@@ -83,7 +83,7 @@
   &lt;li&gt;&lt;p&gt;
 Apple censors
 games,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -268,7 +268,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/10 13:02:57 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-censorship.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-censorship.ja.po 10 Nov 2020 13:02:57 -0000      
1.45
+++ proprietary/po/proprietary-censorship.ja.po 10 Nov 2020 17:37:41 -0000      
1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2016-04-05 14:30+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that impose censorship on what "
@@ -120,7 +120,7 @@
 
"proprietary-jails.html\">インストレーションを検閲するプロプライエタリなシステ"
 "ム
のリスト</a>(わたしたちはそれを「牢獄」と呼びます)は別にあります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-censorship.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-censorship.pot   10 Nov 2020 13:02:57 -0000      
1.29
+++ proprietary/po/proprietary-censorship.pot   10 Nov 2020 17:37:41 -0000      
1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a "
@@ -77,7 +77,7 @@
 "call them &ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-censorship.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-censorship.ru-en.html    10 Nov 2020 13:30:52 
-0000      1.32
+++ proprietary/po/proprietary-censorship.ru-en.html    10 Nov 2020 17:37:41 
-0000      1.33
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One kind of malicious functionality is censorship of what
 users can access.  Here are examples of programs which do this.
 We have a <a
@@ -63,7 +63,7 @@
 <p>Selling products designed as platforms for a
 company to impose censorship ought to be forbidden by law, but it
 isn't.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -209,7 +209,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/10 13:30:52 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-censorship.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-censorship.ru.po 10 Nov 2020 13:30:52 -0000      
1.70
+++ proprietary/po/proprietary-censorship.ru.po 10 Nov 2020 17:37:41 -0000      
1.71
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -93,7 +93,7 @@
 "которые подвергают цензуре установку</a> 
прикладных программ (мы называем "
 "это &ldquo;тюрьмами&rdquo;)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."

Index: proprietary/po/proprietary-coverups.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-coverups.de-diff.html    24 Jun 2020 05:37:11 
-0000      1.5
+++ proprietary/po/proprietary-coverups.de-diff.html    10 Nov 2020 17:37:41 
-0000      1.6
@@ -67,11 +67,11 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;This</em></ins></span> page lists instances where proprietary 
software had a bug,
 and the developers converted it into a malicious functionality by
 trying to cover up the existence of the bug.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;/blockquote&gt;</em></ins></span>
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -156,7 +156,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-coverups.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.de.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-coverups.de.po   24 Jun 2020 05:37:11 -0000      
1.13
+++ proprietary/po/proprietary-coverups.de.po   10 Nov 2020 17:37:41 -0000      
1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 03:05+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -121,7 +121,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "

Index: proprietary/po/proprietary-coverups.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-coverups.es-en.html      24 Jun 2020 05:37:11 
-0000      1.3
+++ proprietary/po/proprietary-coverups.es-en.html      10 Nov 2020 17:37:41 
-0000      1.4
@@ -53,11 +53,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists instances where proprietary software had a bug,
 and the developers converted it into a malicious functionality by
 trying to cover up the existence of the bug.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -138,7 +138,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-coverups.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-coverups.es.po   24 Jun 2020 05:37:11 -0000      
1.9
+++ proprietary/po/proprietary-coverups.es.po   10 Nov 2020 17:37:41 -0000      
1.10
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-20 12:36+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Español <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "

Index: proprietary/po/proprietary-coverups.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-coverups.fr-en.html      24 Jun 2020 05:37:11 
-0000      1.15
+++ proprietary/po/proprietary-coverups.fr-en.html      10 Nov 2020 17:37:41 
-0000      1.16
@@ -53,11 +53,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists instances where proprietary software had a bug,
 and the developers converted it into a malicious functionality by
 trying to cover up the existence of the bug.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -138,7 +138,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-coverups.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.fr.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-coverups.fr.po   5 Oct 2020 13:13:25 -0000       
1.18
+++ proprietary/po/proprietary-coverups.fr.po   10 Nov 2020 17:37:41 -0000      
1.19
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "

Index: proprietary/po/proprietary-coverups.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-coverups.ja-diff.html    31 Jul 2020 03:03:45 
-0000      1.25
+++ proprietary/po/proprietary-coverups.ja-diff.html    10 Nov 2020 17:37:41 
-0000      1.26
@@ -67,14 +67,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;This</em></ins></span> page lists instances where proprietary 
software had a bug,
 and the developers converted it into a malicious functionality by
 trying to cover up the existence of the bug.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Price</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -158,7 +158,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/31 03:03:45 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-coverups.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ja.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-coverups.ja.po   24 Jun 2020 05:37:11 -0000      
1.13
+++ proprietary/po/proprietary-coverups.ja.po   10 Nov 2020 17:37:41 -0000      
1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-01-17 15:05+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "

Index: proprietary/po/proprietary-coverups.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.pot,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-coverups.pot     24 Jun 2020 05:37:11 -0000      
1.9
+++ proprietary/po/proprietary-coverups.pot     10 Nov 2020 17:37:41 -0000      
1.10
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "

Index: proprietary/po/proprietary-coverups.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ru-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-coverups.ru-en.html      24 Jun 2020 05:37:11 
-0000      1.15
+++ proprietary/po/proprietary-coverups.ru-en.html      10 Nov 2020 17:37:41 
-0000      1.16
@@ -53,11 +53,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists instances where proprietary software had a bug,
 and the developers converted it into a malicious functionality by
 trying to cover up the existence of the bug.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -138,7 +138,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-coverups.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ru.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-coverups.ru.po   24 Jun 2020 05:04:03 -0000      
1.20
+++ proprietary/po/proprietary-coverups.ru.po   10 Nov 2020 17:37:41 -0000      
1.21
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "

Index: proprietary/po/proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary-deception.de-diff.html   23 Jul 2020 08:33:20 
-0000      1.36
+++ proprietary/po/proprietary-deception.de-diff.html   10 Nov 2020 17:37:41 
-0000      1.37
@@ -67,14 +67,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Deception</em></ins></span> is <span class="inserted"><ins><em>a 
malicious functionality that makes the program</em></ins></span>
 dishonest or conceals <span class="inserted"><ins><em>trickery. Here are 
examples of such
 malicious functionalities. Cases of</em></ins></span> deception <span 
class="removed"><del><strong>or trickery.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that involve taking
 people's money are listed in &lt;a
 href="/proprietary/proprietary-fraud.html#main-heading"&gt;
 Proprietary Fraud&lt;/a&gt;.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -89,8 +89,11 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202002020"&gt;
     &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
+    them to decide what permissions to give</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>program, and 
then</em></ins></span> &lt;a
+    <span 
class="inserted"><ins><em>href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
     bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
@@ -103,18 +106,15 @@
     &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
     
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
     detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
-    run dirty the rest of</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>time. In real 
driving, the cars exceeded
+    run dirty the rest of the time. In real driving, the cars exceeded
     emissions standards by a factor of up to 35.&lt;/p&gt;
 
     &lt;p&gt;Using free software would not have stopped Volkswagen from
     programming it this way, but would have made it harder to conceal,
     and given the users the possibility of correcting the deception.&lt;/p&gt;
 
-    &lt;p&gt;Former executives of Volkswagen are being</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    &lt;p&gt;Former executives of Volkswagen are being &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -262,7 +262,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/23 08:33:20 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-deception.de.po  23 Jul 2020 08:33:20 -0000      
1.48
+++ proprietary/po/proprietary-deception.de.po  10 Nov 2020 17:37:41 -0000      
1.49
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:43+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "

Index: proprietary/po/proprietary-deception.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-deception.es-en.html     24 Jul 2020 09:00:30 
-0000      1.9
+++ proprietary/po/proprietary-deception.es-en.html     10 Nov 2020 17:37:41 
-0000      1.10
@@ -53,14 +53,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Deception is a malicious functionality that makes the program
 dishonest or conceals trickery. Here are examples of such
 malicious functionalities. Cases of deception that involve taking
 people's money are listed in <a
 href="/proprietary/proprietary-fraud.html#main-heading">
 Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -215,7 +215,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/24 09:00:30 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-deception.es.po  24 Jul 2020 08:38:26 -0000      
1.22
+++ proprietary/po/proprietary-deception.es.po  10 Nov 2020 17:37:41 -0000      
1.23
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-07-24 10:31+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "

Index: proprietary/po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-deception.fr-en.html     23 Jul 2020 10:02:28 
-0000      1.34
+++ proprietary/po/proprietary-deception.fr-en.html     10 Nov 2020 17:37:41 
-0000      1.35
@@ -53,14 +53,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Deception is a malicious functionality that makes the program
 dishonest or conceals trickery. Here are examples of such
 malicious functionalities. Cases of deception that involve taking
 people's money are listed in <a
 href="/proprietary/proprietary-fraud.html#main-heading">
 Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -215,7 +215,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/23 10:02:28 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-deception.fr.po  5 Oct 2020 13:13:25 -0000       
1.61
+++ proprietary/po/proprietary-deception.fr.po  10 Nov 2020 17:37:41 -0000      
1.62
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-07-23 10:55+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: fr <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "

Index: proprietary/po/proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-deception.ja-diff.html   31 Jul 2020 03:03:45 
-0000      1.42
+++ proprietary/po/proprietary-deception.ja-diff.html   10 Nov 2020 17:37:41 
-0000      1.43
@@ -67,14 +67,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Deception</em></ins></span> is <span class="inserted"><ins><em>a 
malicious functionality that makes the program</em></ins></span>
 dishonest or conceals <span class="inserted"><ins><em>trickery. Here are 
examples of such
 malicious functionalities. Cases of</em></ins></span> deception <span 
class="inserted"><ins><em>that involve taking
 people's money are listed in &lt;a
 href="/proprietary/proprietary-fraud.html#main-heading"&gt;
 Proprietary Fraud&lt;/a&gt;.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -163,9 +163,9 @@
     &lt;p&gt;The</em></ins></span> proprietor of the Pokémon Go game &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
     invites restaurants and other businesses to pay to have the game lure
-    people <span class="removed"><del><strong>there&lt;/a&gt;.
+    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo;
       are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
       interfaces designed to mislead users, or make option settings
@@ -173,9 +173,9 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
     users to turn this off&rdquo; while ensuring that few will
-    understand how to actually turn it off.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    understand how to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  &lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
     &lt;p&gt;A top-ranking proprietary Instagram client promising
@@ -262,7 +262,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/31 03:03:45 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/proprietary-deception.ja.po  23 Jul 2020 08:33:20 -0000      
1.49
+++ proprietary/po/proprietary-deception.ja.po  10 Nov 2020 17:37:41 -0000      
1.50
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2016-11-18 13:31+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "

Index: proprietary/po/proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-deception.pot    23 Jul 2020 08:33:20 -0000      
1.32
+++ proprietary/po/proprietary-deception.pot    10 Nov 2020 17:37:41 -0000      
1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious "

Index: proprietary/po/proprietary-deception.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/proprietary-deception.ru-en.html     23 Jul 2020 09:30:18 
-0000      1.33
+++ proprietary/po/proprietary-deception.ru-en.html     10 Nov 2020 17:37:41 
-0000      1.34
@@ -53,14 +53,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Deception is a malicious functionality that makes the program
 dishonest or conceals trickery. Here are examples of such
 malicious functionalities. Cases of deception that involve taking
 people's money are listed in <a
 href="/proprietary/proprietary-fraud.html#main-heading">
 Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -215,7 +215,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/07/23 09:30:18 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary-deception.ru.po  23 Jul 2020 09:30:18 -0000      
1.69
+++ proprietary/po/proprietary-deception.ru.po  10 Nov 2020 17:37:41 -0000      
1.70
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "

Index: proprietary/po/proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.de-diff.html 17 Oct 2020 08:05:08 -0000      
1.32
+++ proprietary/po/proprietary-drm.de-diff.html 10 Nov 2020 17:37:41 -0000      
1.33
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;Here are examples of proprietary programs and systems that
 implement &lt;em&gt;digital restrictions management&lt;/em&gt; (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -84,7 +84,7 @@
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;DRM does more nastiness to published works than merely 
stopping
 people from looking at and/or copying them. Even when it 
allows</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If</em></ins></span> you <span class="inserted"><ins><em>know of an 
example that ought</em></ins></span> to
@@ -226,14 +226,14 @@
 
   &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains DRM specifically designed to &lt;a
-    
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+    iPhone 7 contains DRM specifically designed to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to use the term</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;
 digital
+    to describe the DRM, but we prefer to use the term &lt;a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -550,7 +550,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-drm.de.po        17 Oct 2020 08:05:08 -0000      
1.73
+++ proprietary/po/proprietary-drm.de.po        10 Nov 2020 17:37:41 -0000      
1.74
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -135,7 +135,7 @@
 "Nutzer tun können. Diese Funktionalitäten werden auch <em>digitale "
 "Handschellen</em> genannt."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-drm.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-drm.es-en.html   18 Oct 2020 09:59:20 -0000      
1.5
+++ proprietary/po/proprietary-drm.es-en.html   10 Nov 2020 17:37:41 -0000      
1.6
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -66,7 +66,7 @@
 Please support our campaign
 to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -415,7 +415,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-drm.es.po        18 Oct 2020 09:51:17 -0000      
1.16
+++ proprietary/po/proprietary-drm.es.po        10 Nov 2020 17:37:41 -0000      
1.17
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-18 11:13+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -84,7 +84,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -97,7 +97,7 @@
 "diseñadas para restringir lo que los usuarios pueden hacer.  Estas "
 "funcionalidades también se conocen como <em>esposas digitales</em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-drm.fr-en.html   17 Oct 2020 08:59:36 -0000      
1.42
+++ proprietary/po/proprietary-drm.fr-en.html   10 Nov 2020 17:37:41 -0000      
1.43
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -66,7 +66,7 @@
 Please support our campaign
 to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -415,7 +415,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary-drm.fr.po        17 Oct 2020 08:29:20 -0000      
1.80
+++ proprietary/po/proprietary-drm.fr.po        10 Nov 2020 17:37:41 -0000      
1.81
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -77,7 +77,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -90,7 +90,7 @@
 "conçues dans l'intention de restreindre ce que les utilisateurs peuvent "
 "faire. Ces fonctionnalités sont aussi appelées <em>menottes 
numériques</em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-drm.it-diff.html 17 Oct 2020 08:05:08 -0000      
1.45
+++ proprietary/po/proprietary-drm.it-diff.html 10 Nov 2020 17:37:41 -0000      
1.46
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;Here are examples of proprietary programs and systems that
 implement &lt;em&gt;digital restrictions management&lt;/em&gt; (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -83,7 +83,7 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;The</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -521,7 +521,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-drm.it.po        17 Oct 2020 08:05:08 -0000      
1.62
+++ proprietary/po/proprietary-drm.it.po        10 Nov 2020 17:37:41 -0000      
1.63
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-12-30 14:17+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -130,7 +130,7 @@
 "gli utenti. Queste funzionalità vengono anche chiamate <em>manette 
digitali</"
 "em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-drm.ja-diff.html 17 Oct 2020 08:05:08 -0000      
1.48
+++ proprietary/po/proprietary-drm.ja-diff.html 10 Nov 2020 17:37:41 -0000      
1.49
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;Here are examples of proprietary programs and systems that
 implement &lt;em&gt;digital restrictions management&lt;/em&gt; (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -80,7 +80,7 @@
 Please support our campaign
 to &lt;a href="http://DefectiveByDesign.org/"&gt;abolish DRM&lt;/a&gt;.
 &lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -512,7 +512,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary-drm.ja.po        17 Oct 2020 08:05:08 -0000      
1.60
+++ proprietary/po/proprietary-drm.ja.po        10 Nov 2020 17:37:42 -0000      
1.61
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:55+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -111,7 +111,7 @@
 "(DRM)を実装している例です: 
ユーザができることを意図的に制限するように設計され"
 "た機能です。この機能は、<em>ディジタル手錠
</em>とも呼ばれます。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-drm.pot  17 Oct 2020 08:05:08 -0000      1.40
+++ proprietary/po/proprietary-drm.pot  10 Nov 2020 17:37:42 -0000      1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -76,7 +76,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a "
 
"href=\"http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management\";>
 "

Index: proprietary/po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-drm.ru-en.html   19 Oct 2020 10:00:05 -0000      
1.44
+++ proprietary/po/proprietary-drm.ru-en.html   10 Nov 2020 17:37:42 -0000      
1.45
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -66,7 +66,7 @@
 Please support our campaign
 to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -415,7 +415,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary/po/proprietary-drm.ru.po        19 Oct 2020 10:00:05 -0000      
1.101
+++ proprietary/po/proprietary-drm.ru.po        10 Nov 2020 17:37:42 -0000      
1.102
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -91,7 +91,7 @@
 "ограничения того, что могут делать 
пользователи. Эти функции называются "
 "также <em>цифровыми наручниками</em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-fraud.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.es-en.html 24 Jun 2020 05:37:11 -0000      
1.4
+++ proprietary/po/proprietary-fraud.es-en.html 10 Nov 2020 17:37:42 -0000      
1.5
@@ -52,10 +52,10 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Here are some examples of proprietary software that defrauds
   users&mdash;taking their money by trickery.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -141,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-fraud.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-fraud.es.po      24 Jun 2020 05:37:11 -0000      
1.9
+++ proprietary/po/proprietary-fraud.es.po      10 Nov 2020 17:37:42 -0000      
1.10
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-fraud.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-20 13:17+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."

Index: proprietary/po/proprietary-fraud.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.fr-en.html 24 Jun 2020 05:37:11 -0000      
1.4
+++ proprietary/po/proprietary-fraud.fr-en.html 10 Nov 2020 17:37:42 -0000      
1.5
@@ -52,10 +52,10 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Here are some examples of proprietary software that defrauds
   users&mdash;taking their money by trickery.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -141,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-fraud.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.fr.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-fraud.fr.po      5 Oct 2020 13:13:25 -0000       
1.7
+++ proprietary/po/proprietary-fraud.fr.po      10 Nov 2020 17:37:42 -0000      
1.8
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-fraud.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
 "Language-Team: French <trad-gnu@apri.org>\n"
@@ -76,7 +76,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."

Index: proprietary/po/proprietary-fraud.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.pot,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.pot        24 Jun 2020 05:37:11 -0000      
1.4
+++ proprietary/po/proprietary-fraud.pot        10 Nov 2020 17:37:42 -0000      
1.5
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-fraud.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds "
 "users&mdash;taking their money by trickery."

Index: proprietary/po/proprietary-fraud.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.ru-en.html 24 Jun 2020 05:37:11 -0000      
1.4
+++ proprietary/po/proprietary-fraud.ru-en.html 10 Nov 2020 17:37:42 -0000      
1.5
@@ -52,10 +52,10 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
   <p>Here are some examples of proprietary software that defrauds
   users&mdash;taking their money by trickery.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -141,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-fraud.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.ru.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-fraud.ru.po      24 Jun 2020 05:04:03 -0000      
1.6
+++ proprietary/po/proprietary-fraud.ru.po      10 Nov 2020 17:37:42 -0000      
1.7
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."

Index: proprietary/po/proprietary-incompatibility.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-incompatibility.es-en.html       24 Jun 2020 
05:37:11 -0000      1.4
+++ proprietary/po/proprietary-incompatibility.es-en.html       10 Nov 2020 
17:37:42 -0000      1.5
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One of these malicious functionalities is the deliberate
 incompatibility of a program with third party software that operates on
 the same data types.</p>
@@ -78,7 +78,7 @@
 artificial restrictions</a> on the interoperability of their products to
 monopolize the market, and this is often achieved through proprietary
 malware.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -182,7 +182,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-incompatibility.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.es.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-incompatibility.es.po    24 Jun 2020 05:37:11 
-0000      1.10
+++ proprietary/po/proprietary-incompatibility.es.po    10 Nov 2020 17:37:42 
-0000      1.11
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-incompatibility.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-20 13:22+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
@@ -90,7 +90,7 @@
 "Una de estas funcionalidades maliciosas es la intencionada incompatibilidad "
 "de un programa con software de terceros que opera con el mismo tipo de datos."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -102,7 +102,7 @@
 "algún otro programa, y en particular, instalar software libre que pudiera "
 "liberar el dispositivo en el que se ejecuta ese software."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -114,7 +114,7 @@
 "datos antiguos se volverá muy complicado si se deja de mantener el software "
 "privativo que puede leerlos."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -126,7 +126,7 @@
 "sistema sea tan engorrosa o lenta que resulte impracticable, a menos que se "
 "trate de una pequeña cantidad de datos."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"

Index: proprietary/po/proprietary-incompatibility.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-incompatibility.fr-en.html       24 Jun 2020 
05:37:11 -0000      1.17
+++ proprietary/po/proprietary-incompatibility.fr-en.html       10 Nov 2020 
17:37:42 -0000      1.18
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One of these malicious functionalities is the deliberate
 incompatibility of a program with third party software that operates on
 the same data types.</p>
@@ -78,7 +78,7 @@
 artificial restrictions</a> on the interoperability of their products to
 monopolize the market, and this is often achieved through proprietary
 malware.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -182,7 +182,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-incompatibility.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.fr.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-incompatibility.fr.po    5 Oct 2020 13:13:25 
-0000       1.26
+++ proprietary/po/proprietary-incompatibility.fr.po    10 Nov 2020 17:37:42 
-0000      1.27
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-incompatibility.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
@@ -84,7 +84,7 @@
 "L'une de ces fonctionnalités malveillantes est l'incompatibilité 
délibérée "
 "d'un programme avec d'autres logiciels qui utilisent le même type de 
données."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -97,7 +97,7 @@
 "programme libre, qui permettrait de libérer l'appareil sur lequel tourne le "
 "logiciel."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -109,7 +109,7 @@
 "récupération de données anciennes sera très difficile si le logiciel "
 "privateur qui peut les lire n'est plus pris en charge."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -121,7 +121,7 @@
 "système, si compliquée ou si lente qu'elle n'est pas faisable pour une "
 "quantité significative de données."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"

Index: proprietary/po/proprietary-incompatibility.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-incompatibility.pot      24 Jun 2020 05:37:11 
-0000      1.12
+++ proprietary/po/proprietary-incompatibility.pot      10 Nov 2020 17:37:42 
-0000      1.13
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-incompatibility.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,13 +68,13 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -82,7 +82,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -90,7 +90,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -98,7 +98,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a "
 
"href=\"https://www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-companies\";>
 "

Index: proprietary/po/proprietary-incompatibility.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-incompatibility.ru-en.html       24 Jun 2020 
05:37:11 -0000      1.17
+++ proprietary/po/proprietary-incompatibility.ru-en.html       10 Nov 2020 
17:37:42 -0000      1.18
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One of these malicious functionalities is the deliberate
 incompatibility of a program with third party software that operates on
 the same data types.</p>
@@ -78,7 +78,7 @@
 artificial restrictions</a> on the interoperability of their products to
 monopolize the market, and this is often achieved through proprietary
 malware.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -182,7 +182,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-incompatibility.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.ru.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-incompatibility.ru.po    24 Jun 2020 05:04:03 
-0000      1.31
+++ proprietary/po/proprietary-incompatibility.ru.po    10 Nov 2020 17:37:42 
-0000      1.32
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
@@ -88,7 +88,7 @@
 "программы с программами третьих сторон, 
которые работают с теми же типами "
 "данных."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -101,7 +101,7 @@
 "свободные программы, которые могут 
освободить устройство, на котором "
 "работают."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -113,7 +113,7 @@
 "данных станет весьма затруднительным, 
если поддержка несвободных программ, "
 "которые могут их читать, прекратится."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -125,7 +125,7 @@
 "затрудняется или замедляется, что ее 
можно провести только над небольшим "
 "количеством данных."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-insecurity.de-diff.html  17 Oct 2020 08:05:08 
-0000      1.43
+++ proprietary/po/proprietary-insecurity.de-diff.html  10 Nov 2020 17:37:42 
-0000      1.44
@@ -67,7 +67,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in
 proprietary software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
@@ -91,7 +91,7 @@
 introduce them deliberately.  In any case, they keep</strong></del></span> 
<span class="inserted"><ins><em>is that</em></ins></span> users <span 
class="inserted"><ins><em>are</em></ins></span>
 &lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  Keeping
 the users helpless is what's culpable about proprietary software.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -161,7 +161,7 @@
     access</em></ins></span> the <span 
class="removed"><del><strong>airbags&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 &lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and snoop on the 
household
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump 
designed</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
@@ -309,8 +309,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; intravenous</em></ins></span> pump
-    designed for hospitals is connected to the internet. Naturally &lt;a
+    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
+    designed</em></ins></span> for hospitals is connected to the internet. 
Naturally &lt;a
     
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
   <span class="removed"><del><strong>&lt;p&gt;Note</strong></del></span>
@@ -1136,7 +1136,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary/po/proprietary-insecurity.de.po 17 Oct 2020 08:05:08 -0000      
1.146
+++ proprietary/po/proprietary-insecurity.de.po 10 Nov 2020 17:37:42 -0000      
1.147
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -131,7 +131,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-insecurity.es-en.html    18 Oct 2020 09:59:20 
-0000      1.14
+++ proprietary/po/proprietary-insecurity.es-en.html    10 Nov 2020 17:37:42 
-0000      1.15
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy. Even though most of these security flaws are unintentional,
@@ -65,7 +65,7 @@
 makes bugs more dangerous in proprietary software is that users are
 <em>helpless to fix any security problems that arise</em>.  Keeping
 the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -789,7 +789,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-insecurity.es.po 18 Oct 2020 09:51:17 -0000      
1.39
+++ proprietary/po/proprietary-insecurity.es.po 10 Nov 2020 17:37:42 -0000      
1.40
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-18 11:14+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -84,7 +84,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -99,7 +99,7 @@
 "aquí para mostrar que el software privativo no es inmune a los fallos, y a "
 "menudo es bastante chapucero."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary-insecurity.fr-en.html    17 Oct 2020 08:59:36 
-0000      1.91
+++ proprietary/po/proprietary-insecurity.fr-en.html    10 Nov 2020 17:37:42 
-0000      1.92
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy. Even though most of these security flaws are unintentional,
@@ -65,7 +65,7 @@
 makes bugs more dangerous in proprietary software is that users are
 <em>helpless to fix any security problems that arise</em>.  Keeping
 the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -789,7 +789,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary/po/proprietary-insecurity.fr.po 17 Oct 2020 08:29:20 -0000      
1.200
+++ proprietary/po/proprietary-insecurity.fr.po 10 Nov 2020 17:37:42 -0000      
1.201
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -80,7 +80,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -96,7 +96,7 @@
 "logiciel privateur n'est pas exempt de bogues et qu'il est souvent tout à "
 "fait bâclé."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-insecurity.it-diff.html  17 Oct 2020 08:05:08 
-0000      1.58
+++ proprietary/po/proprietary-insecurity.it-diff.html  10 Nov 2020 17:37:42 
-0000      1.59
@@ -67,7 +67,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in
 proprietary software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
@@ -97,7 +97,7 @@
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
       Crackers found a way</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
@@ -135,29 +135,30 @@
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
     A disasterous security bug&lt;/a&gt; touches millions</em></ins></span> of 
<span class="removed"><del><strong>HP laptops logged the user's
-    keystroke to a file</strong></del></span> <span 
class="inserted"><ins><em>products</em></ins></span> in the <span 
class="removed"><del><strong>filesystem. Any process with access 
to</strong></del></span>
+    keystroke to a file</strong></del></span> <span 
class="inserted"><ins><em>products</em></ins></span> in the <span 
class="removed"><del><strong>filesystem. Any process with access to
+    the filesystem or</strong></del></span>
     <span class="inserted"><ins><em>Internet of Stings.&lt;/p&gt;
 
-    &lt;p&gt;As a result, anyone can sting</em></ins></span> the <span 
class="removed"><del><strong>filesystem or</strong></del></span> <span 
class="inserted"><ins><em>user, not only</em></ins></span> the <span 
class="removed"><del><strong>MapViewOfFile API could gain 
access</strong></del></span>
+    &lt;p&gt;As a result, anyone can sting</em></ins></span> the <span 
class="removed"><del><strong>MapViewOfFile API could gain access 
to</strong></del></span> <span class="inserted"><ins><em>user, not 
only</em></ins></span> the
+    <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
     <span class="inserted"><ins><em>manufacturer.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912170"&gt;
-    &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed</em></ins></span> to <span 
class="inserted"><ins><em>interfere</em></ins></span> the
-    <span class="removed"><del><strong>log. Furthermore,</strong></del></span> 
<span class="inserted"><ins><em>Amazon Ring proprietary system, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
+    &lt;p&gt;Some security breakers (wrongly referred in this article 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
+    managed</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>interfere</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;information-leak via Covert Storage
+    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>Amazon Ring proprietary system, and &lt;a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>capture keystrokes without
+    taking</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;information-leak via Covert Storage
-    Channel enables malware authors to capture keystrokes without
-    taking</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>household
+    access</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and snoop on the 
household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge</em></ins></span> of <span 
class="removed"><del><strong>being classified as malicious 
task</strong></del></span> <span class="inserted"><ins><em>the wifi password 
would not be sufficient to carry
@@ -1094,7 +1095,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/po/proprietary-insecurity.it.po 17 Oct 2020 08:05:08 -0000      
1.163
+++ proprietary/po/proprietary-insecurity.it.po 10 Nov 2020 17:37:42 -0000      
1.164
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -118,7 +118,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -127,7 +127,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/proprietary-insecurity.ja-diff.html  17 Oct 2020 08:05:08 
-0000      1.79
+++ proprietary/po/proprietary-insecurity.ja-diff.html  10 Nov 2020 17:37:42 
-0000      1.80
@@ -67,7 +67,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in
 proprietary software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
@@ -91,7 +91,7 @@
 &lt;li&gt;
 &lt;p&gt;4G LTE phone networks are drastically insecure. They 
can</strong></del></span> <span class="inserted"><ins><em>any security problems 
that arise&lt;/em&gt;.  Keeping
 the users helpless is what's culpable about proprietary software.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to</em></ins></span> be
@@ -163,7 +163,7 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
-    a <span class="removed"><del><strong>proprietary ASN.1 library, 
used</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to &lt;a
+    a <span class="removed"><del><strong>proprietary ASN.1 library, used in 
cell</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
     access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
@@ -521,8 +521,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201607190"&gt;
-    &lt;p&gt;A bug in a proprietary ASN.1 library, used</em></ins></span>
-    in cell phone towers as well as cell phones and routers, &lt;a
+    &lt;p&gt;A bug in a proprietary ASN.1 library, used
+    in cell</em></ins></span> phone towers as well as cell phones and routers, 
&lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1037,7 +1037,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/proprietary-insecurity.ja.po 17 Oct 2020 08:05:08 -0000      
1.136
+++ proprietary/po/proprietary-insecurity.ja.po 10 Nov 2020 17:37:42 -0000      
1.137
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -109,7 +109,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/proprietary-insecurity.pot   17 Oct 2020 08:05:08 -0000      
1.102
+++ proprietary/po/proprietary-insecurity.pot   10 Nov 2020 17:37:42 -0000      
1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -77,7 +77,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-insecurity.ru-en.html    19 Oct 2020 10:00:05 
-0000      1.90
+++ proprietary/po/proprietary-insecurity.ru-en.html    10 Nov 2020 17:37:42 
-0000      1.91
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy. Even though most of these security flaws are unintentional,
@@ -65,7 +65,7 @@
 makes bugs more dangerous in proprietary software is that users are
 <em>helpless to fix any security problems that arise</em>.  Keeping
 the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -789,7 +789,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/proprietary-insecurity.ru.po 19 Oct 2020 10:00:05 -0000      
1.252
+++ proprietary/po/proprietary-insecurity.ru.po 10 Nov 2020 17:37:42 -0000      
1.253
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -94,7 +94,7 @@
 "сообщаем о них, чтобы показать, что 
несвободные программы не исключают "
 "ошибки, и часто весьма грубые."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "

Index: proprietary/po/proprietary-interference.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-interference.de-diff.html        17 Oct 2020 
08:05:08 -0000      1.32
+++ proprietary/po/proprietary-interference.de-diff.html        10 Nov 2020 
17:37:42 -0000      1.33
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;One kind of malicious functionality mediates developer's interference
 into the use of the software.</em></ins></span> This page describes how 
various proprietary
 programs <span class="removed"><del><strong>mess up</strong></del></span> 
<span class="inserted"><ins><em>harass or annoy</em></ins></span> the
@@ -77,7 +77,7 @@
 word <span class="removed"><del><strong>&ldquo;sabotage&rdquo;. Nonetheless, 
they are nasty and
 wrong.</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;sabotage&rdquo; is too strong for 
them.</em></ins></span>
 &lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -96,10 +96,7 @@
     universal remote back door&lt;/a&gt;.  Tesla used it to &lt;a
     
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update"&gt;
     disable the autopilot features&lt;/a&gt; on people's cars to make them pay
-    extra for re-enabling</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Pearson's</strong></del></span> <span 
class="inserted"><ins><em>features.&lt;/p&gt;
+    extra for re-enabling the features.&lt;/p&gt;
 
     &lt;p&gt;This kind of malfeature is only possible with proprietary
     software&mdash;free software is controlled by its users who wouldn't
@@ -109,7 +106,10 @@
   &lt;li id="M201912170"&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed to interfere the Amazon Ring proprietary system, and &lt;a
+    managed to interfere</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Pearson's</strong></del></span> <span 
class="inserted"><ins><em>Amazon Ring proprietary system, and &lt;a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -410,7 +410,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-interference.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-interference.de.po       17 Oct 2020 08:05:08 
-0000      1.70
+++ proprietary/po/proprietary-interference.de.po       10 Nov 2020 17:37:42 
-0000      1.71
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | {+One kind of malicious functionality mediates developer's interference
 # | into the use of the software.+} This page describes how various
 # | proprietary programs [-mess up-] {+harass or annoy the user, or cause

Index: proprietary/po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-interference.es-en.html  18 Oct 2020 09:59:20 
-0000      1.8
+++ proprietary/po/proprietary-interference.es-en.html  10 Nov 2020 17:37:42 
-0000      1.9
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One kind of malicious functionality mediates developer's interference
 into the use of the software. This page describes how various proprietary
 programs harass or annoy the user, or cause trouble for the user.  These
@@ -60,7 +60,7 @@
 href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
 word &ldquo;sabotage&rdquo; is too strong for them.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -329,7 +329,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-interference.es.po       18 Oct 2020 09:59:20 
-0000      1.23
+++ proprietary/po/proprietary-interference.es.po       10 Nov 2020 17:37:42 
-0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-18 11:14+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -81,7 +81,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "

Index: proprietary/po/proprietary-interference.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-interference.fr-en.html  17 Oct 2020 08:59:36 
-0000      1.45
+++ proprietary/po/proprietary-interference.fr-en.html  10 Nov 2020 17:37:42 
-0000      1.46
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One kind of malicious functionality mediates developer's interference
 into the use of the software. This page describes how various proprietary
 programs harass or annoy the user, or cause trouble for the user.  These
@@ -60,7 +60,7 @@
 href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
 word &ldquo;sabotage&rdquo; is too strong for them.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -329,7 +329,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-interference.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/proprietary-interference.fr.po       17 Oct 2020 08:29:20 
-0000      1.95
+++ proprietary/po/proprietary-interference.fr.po       10 Nov 2020 17:37:42 
-0000      1.96
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "

Index: proprietary/po/proprietary-interference.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-interference.ja-diff.html        17 Oct 2020 
08:05:09 -0000      1.44
+++ proprietary/po/proprietary-interference.ja-diff.html        10 Nov 2020 
17:37:42 -0000      1.45
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;One kind of malicious functionality mediates developer's interference
 into the use of the software.</em></ins></span> This page describes how 
various proprietary
 programs <span class="removed"><del><strong>mess up</strong></del></span> 
<span class="inserted"><ins><em>harass or annoy</em></ins></span> the
@@ -75,7 +75,7 @@
 
href="/proprietary/proprietary-sabotage#about-page"&gt;sabotage&lt;/a&gt;,</em></ins></span>
 but <span class="removed"><del><strong>they are not grave 
enough</strong></del></span> <span class="inserted"><ins><em>the
 word &ldquo;sabotage&rdquo; is too strong for them.
 &lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
@@ -394,7 +394,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-interference.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/proprietary-interference.ja.po       17 Oct 2020 08:05:09 
-0000      1.67
+++ proprietary/po/proprietary-interference.ja.po       10 Nov 2020 17:37:42 
-0000      1.68
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:53+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "This page describes how various proprietary programs mess up the user's "

Index: proprietary/po/proprietary-interference.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.pot,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-interference.pot 17 Oct 2020 08:05:09 -0000      
1.45
+++ proprietary/po/proprietary-interference.pot 10 Nov 2020 17:37:42 -0000      
1.46
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "

Index: proprietary/po/proprietary-interference.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-interference.ru-en.html  19 Oct 2020 10:00:05 
-0000      1.45
+++ proprietary/po/proprietary-interference.ru-en.html  10 Nov 2020 17:37:42 
-0000      1.46
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>One kind of malicious functionality mediates developer's interference
 into the use of the software. This page describes how various proprietary
 programs harass or annoy the user, or cause trouble for the user.  These
@@ -60,7 +60,7 @@
 href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
 word &ldquo;sabotage&rdquo; is too strong for them.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -329,7 +329,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/proprietary-interference.ru.po       19 Oct 2020 10:00:05 
-0000      1.114
+++ proprietary/po/proprietary-interference.ru.po       10 Nov 2020 17:37:42 
-0000      1.115
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "

Index: proprietary/po/proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-jails.de-diff.html       7 Nov 2020 10:01:57 
-0000       1.37
+++ proprietary/po/proprietary-jails.de-diff.html       10 Nov 2020 17:37:42 
-0000      1.38
@@ -68,7 +68,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;The &ldquo;jails&rdquo; are malicious</em></ins></span> operating 
systems that are
 <span class="removed"><del><strong>&lt;em&gt;jails&lt;/em&gt;: they 
are</strong></del></span>
 designed to impose censorship of which applications the user can install.
@@ -91,7 +91,7 @@
 <span class="inserted"><ins><em>&lt;p&gt;This page lists a few jails, along 
with some of the methods they use
 to censor apps, and includes specific examples of apps that were blocked
 using this censorship power.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -197,22 +197,22 @@
 
     &lt;p&gt;Thus, not only does Apple use the App Store as an instrument
     of censorship, it also uses the iThing operating system for that
-    purpose.&lt;/p&gt;</em></ins></span>
+    purpose.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905150"&gt;
+  &lt;li id="M201905150"&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable even if it didn't lead to security threats as 
well.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201710130"&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201710130"&gt;</em></ins></span>
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
     censoring apps for the US government too&lt;/a&gt;. Specifically, it is
@@ -444,7 +444,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/07 10:01:57 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary/po/proprietary-jails.de.po      7 Nov 2020 10:01:57 -0000       
1.65
+++ proprietary/po/proprietary-jails.de.po      10 Nov 2020 17:37:42 -0000      
1.66
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here-]{+The &ldquo;jails&rdquo;+} are [-examples of proprietary-]
 # | {+malicious+} operating systems that [-are <em>jails</em>: they-] are
 # | designed to impose censorship of which applications the user can install. 
@@ -144,7 +144,7 @@
 "ZRViDum.jpg\">Bild eines iGefängnisses</a> , <cite><q>Your device is your "
 "prison. Go outside.</q></cite>, illustriert dies."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -155,7 +155,7 @@
 "Unternehmen zu verkaufen, um Zensur zu verhängen, sollte per Gesetz verboten 
"
 "sein&#160;&#8209;&#160;ist es aber nicht."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-jails.es-en.html 8 Nov 2020 10:29:08 -0000       
1.35
+++ proprietary/po/proprietary-jails.es-en.html 10 Nov 2020 17:37:42 -0000      
1.36
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>The &ldquo;jails&rdquo; are malicious operating systems that are
 designed to impose censorship of which applications the user can install.
 The <a href="http://i.imgur.com/ZRViDum.jpg";>image of the iPrison</a>
@@ -68,7 +68,7 @@
 <p>This page lists a few jails, along with some of the methods they use
 to censor apps, and includes specific examples of apps that were blocked
 using this censorship power.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary/po/proprietary-jails.es.po      8 Nov 2020 10:17:18 -0000       
1.75
+++ proprietary/po/proprietary-jails.es.po      10 Nov 2020 17:37:42 -0000      
1.76
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-11-08 11:14+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -95,7 +95,7 @@
 "href=\"http://i.imgur.com/ZRViDum.jpg\";>imagen de una iPrisión</a> ilustra "
 "el problema."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -106,7 +106,7 @@
 "para que una empresa imponga la censura debería estar prohibida por la ley, "
 "pero no lo está."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-jails.fr-en.html 7 Nov 2020 13:01:46 -0000       
1.39
+++ proprietary/po/proprietary-jails.fr-en.html 10 Nov 2020 17:37:42 -0000      
1.40
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>The &ldquo;jails&rdquo; are malicious operating systems that are
 designed to impose censorship of which applications the user can install.
 The <a href="http://i.imgur.com/ZRViDum.jpg";>image of the iPrison</a>
@@ -68,7 +68,7 @@
 <p>This page lists a few jails, along with some of the methods they use
 to censor apps, and includes specific examples of apps that were blocked
 using this censorship power.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/07 13:01:46 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/proprietary-jails.fr.po      7 Nov 2020 12:26:44 -0000       
1.82
+++ proprietary/po/proprietary-jails.fr.po      10 Nov 2020 17:37:42 -0000      
1.83
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-11-07 13:25+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -90,7 +90,7 @@
 "\"http://i.imgur.com/ZRViDum.jpg\";>image de l'iPrison</a> illustre ce "
 "problème."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -101,7 +101,7 @@
 "servant à une société pour imposer la censure devrait être interdit par 
la "
 "loi, mais ce n'est pas le cas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-jails.it-diff.html       7 Nov 2020 10:01:57 
-0000       1.44
+++ proprietary/po/proprietary-jails.it-diff.html       10 Nov 2020 17:37:42 
-0000      1.45
@@ -68,7 +68,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;The &ldquo;jails&rdquo; are malicious operating</em></ins></span> 
systems that are
 <span class="removed"><del><strong>&lt;em&gt;jails&lt;/em&gt;: they do not 
allow</strong></del></span>
 <span class="inserted"><ins><em>designed to impose censorship of which 
applications</em></ins></span> the user <span class="removed"><del><strong>to 
freely install
@@ -94,7 +94,7 @@
 <span class="inserted"><ins><em>&lt;p&gt;This page lists a few jails, along 
with some of the methods they use</em></ins></span>
 to <span class="removed"><del><strong>strengthen</strong></del></span> <span 
class="inserted"><ins><em>censor apps, and includes specific examples of 
apps</em></ins></span> that <span class="inserted"><ins><em>were blocked
 using this censorship power.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in this page but isn't
@@ -159,14 +159,18 @@
 <span 
class="removed"><del><strong>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
 by blocking distribution</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html#TOC"&gt;part</em></ins></span>
 of
-    the <span class="removed"><del><strong>LinkedIn app in 
Russia&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>LinkedIn</strong></del></span> 
<span class="inserted"><ins><em>operating system&lt;/a&gt;), but Apple could 
change that policy step
+    by step.  Or perhaps Apple will define malware to include 
any</em></ins></span> app <span class="removed"><del><strong>in 
Russia&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;This is ironic because LinkedIn is a surveillance system
 itself. While subjecting its users to its own surveillance, it tries
-to protect its users from Russian surveillance, and is therefore
-subject to Russian censorship.&lt;/p&gt;
+to protect its</strong></del></span>
+    <span class="inserted"><ins><em>that China does not like.&lt;/p&gt;
+
+    &lt;p&gt;For free software, this means</em></ins></span> users <span 
class="removed"><del><strong>from Russian surveillance, and is therefore
+subject</strong></del></span> <span class="inserted"><ins><em>will 
need</em></ins></span> to <span class="removed"><del><strong>Russian 
censorship.&lt;/p&gt;
 
-&lt;p&gt;However, the point here is the wrong of Apple's censorship of
+&lt;p&gt;However, the point here is the wrong of</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> Apple's <span 
class="removed"><del><strong>censorship of
 apps.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -189,20 +193,21 @@
 committed the enormity of disassembling some iThings.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>operating system&lt;/a&gt;), but</em></ins></span> 
Apple <span class="removed"><del><strong>rejected an app</strong></del></span> 
<span class="inserted"><ins><em>could change</em></ins></span> that <span 
class="removed"><del><strong>displayed the locations of US drone
+&lt;li&gt;&lt;p&gt;
+Apple rejected an app that displayed the locations of US drone
 assassinations, giving various excuses. Each time the developers
 fixed one &ldquo;problem&rdquo;, Apple complained about another.
-After the fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>policy step
-    by step.  Or perhaps</em></ins></span> Apple <span 
class="removed"><del><strong>&lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring the</strong></del></span> <span 
class="inserted"><ins><em>will define malware to include any</em></ins></span> 
app <span class="removed"><del><strong>based on the subject matter&lt;/a&gt;.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring the app based on the subject matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
 As of 2015, Apple &lt;a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
 rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>approval after 
compilation.</em></ins></span>  This <span 
class="removed"><del><strong>particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
 affects other Apple services&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
@@ -210,15 +215,11 @@
 &lt;a
 
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;Google
 censored installation of Samsung's ad-blocker,&lt;/a&gt; saying that
-blocking ads is &ldquo;interference&rdquo; with the sites</strong></del></span>
-    that
-<span class="removed"><del><strong>advertise (and surveil users through 
ads).&lt;/p&gt;
-
-&lt;p&gt;The ad-blocker is proprietary</strong></del></span> <span 
class="inserted"><ins><em>China does not like.&lt;/p&gt;
-
-    &lt;p&gt;For free</em></ins></span> software, <span 
class="removed"><del><strong>just like the program (Google
-Play) that Google used</strong></del></span> <span 
class="inserted"><ins><em>this means users will need</em></ins></span> to <span 
class="removed"><del><strong>deny access</strong></del></span> <span 
class="inserted"><ins><em>get Apple's
-    approval after compilation.  This amounts</em></ins></span> to <span 
class="removed"><del><strong>install it. Using</strong></del></span> a <span 
class="removed"><del><strong>nonfree program
+blocking ads is &ldquo;interference&rdquo; with the sites that
+advertise (and surveil users through ads).&lt;/p&gt;
+
+&lt;p&gt;The ad-blocker is proprietary software, just like the program (Google
+Play) that Google used to deny access</strong></del></span> <span 
class="inserted"><ins><em>amounts</em></ins></span> to <span 
class="removed"><del><strong>install it. Using</strong></del></span> a <span 
class="removed"><del><strong>nonfree program
 gives</strong></del></span> <span class="inserted"><ins><em>system of 
surveilling</em></ins></span>
     the <span class="removed"><del><strong>owner power over you, and Google 
has exercised that power.&lt;/p&gt;
 
@@ -528,7 +529,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/07 10:01:57 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/proprietary-jails.it.po      7 Nov 2020 10:01:58 -0000       
1.68
+++ proprietary/po/proprietary-jails.it.po      10 Nov 2020 17:37:42 -0000      
1.69
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:15+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Here-]{+The &ldquo;jails&rdquo;+} are [-examples of proprietary-]
 # | {+malicious operating+} systems that are [-<em>jails</em>: they do not
 # | allow-] {+designed to impose censorship of which applications+} the user
@@ -140,7 +140,7 @@
 "\"http://i.imgur.com/ZRViDum.jpg\";>immagine dell'iPrigione</a> illustra "
 "questo problema."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -150,7 +150,7 @@
 "possiede il sistema. Vendere prodotti progettati come piattaforme tramite "
 "cui le società possono censurare dovrebbe essere illegale, ma non lo è."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-jails.ja-diff.html       7 Nov 2020 10:01:58 
-0000       1.47
+++ proprietary/po/proprietary-jails.ja-diff.html       10 Nov 2020 17:37:42 
-0000      1.48
@@ -68,7 +68,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;The &ldquo;jails&rdquo; are malicious operating</em></ins></span> 
systems that are
 <span class="removed"><del><strong>&lt;em&gt;jails&lt;/em&gt;: they do not 
allow</strong></del></span>
 <span class="inserted"><ins><em>designed to impose censorship of which 
applications</em></ins></span> the user <span class="removed"><del><strong>to 
freely install
@@ -86,7 +86,7 @@
 <span class="inserted"><ins><em>&lt;p&gt;This page lists a few jails, along 
with some of the methods they use
 to censor apps, and includes specific examples of apps that were blocked
 using this censorship power.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -431,7 +431,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/07 10:01:58 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-jails.ja.po      7 Nov 2020 10:01:58 -0000       
1.58
+++ proprietary/po/proprietary-jails.ja.po      10 Nov 2020 17:37:42 -0000      
1.59
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:28+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that are <em>jails</em>: they do "
@@ -116,7 +116,7 @@
 "リケーションをインストールすることを認めません。<a 
href=\"http://i.imgur.com/";
 "ZRViDum.jpg\">iPrisonの画像</a>がこの問題を描いています。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -126,7 +126,7 @@
 "す。一つの会社のプラットフォーム
として、検閲を強制するように設計された製品を"
 
"販売するのは法律で禁止されるべきですが、そうなっていません。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-jails.pot        7 Nov 2020 10:01:58 -0000       
1.40
+++ proprietary/po/proprietary-jails.pot        10 Nov 2020 17:37:42 -0000      
1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a "
@@ -76,14 +76,14 @@
 "this issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-jails.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/proprietary-jails.ru-en.html 7 Nov 2020 11:30:44 -0000       
1.41
+++ proprietary/po/proprietary-jails.ru-en.html 10 Nov 2020 17:37:42 -0000      
1.42
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>The &ldquo;jails&rdquo; are malicious operating systems that are
 designed to impose censorship of which applications the user can install.
 The <a href="http://i.imgur.com/ZRViDum.jpg";>image of the iPrison</a>
@@ -68,7 +68,7 @@
 <p>This page lists a few jails, along with some of the methods they use
 to censor apps, and includes specific examples of apps that were blocked
 using this censorship power.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/07 11:30:44 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary/po/proprietary-jails.ru.po      7 Nov 2020 11:30:44 -0000       
1.101
+++ proprietary/po/proprietary-jails.ru.po      10 Nov 2020 17:37:42 -0000      
1.102
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -91,7 +91,7 @@
 "может устанавливать пользователь. <a 
href=\"http://i.imgur.com/ZRViDum.jpg";
 "\">Изображение ай-тюрьмы</a> иллюстрирует 
эту проблему."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -101,7 +101,7 @@
 "владеющей системой. Продажа продуктов, 
спроектированных как платформы для "
 "наложения компанией цензуры, должна быть 
запрещена законом."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "

Index: proprietary/po/proprietary-manipulation.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-manipulation.es-en.html  24 Jun 2020 05:37:12 
-0000      1.4
+++ proprietary/po/proprietary-manipulation.es-en.html  10 Nov 2020 17:37:42 
-0000      1.5
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Manipulation of users is one of these malicious functionalities.
 Here are examples of programs that are designed to do this by taking
 advantage of human psychology.</p>
@@ -62,7 +62,7 @@
 href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
 which also take advantage of human psychology, but in a much more
 elaborate and dangerous way.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -167,7 +167,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-manipulation.es.po       24 Jun 2020 05:37:12 
-0000      1.9
+++ proprietary/po/proprietary-manipulation.es.po       10 Nov 2020 17:37:42 
-0000      1.10
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-21 12:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
@@ -92,7 +92,7 @@
 "Aquí se presentan ejemplos de programas que se han diseñado para hacerlo "
 "aprovechando características de la psicología humana."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "

Index: proprietary/po/proprietary-manipulation.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-manipulation.fr-en.html  24 Jun 2020 05:37:12 
-0000      1.6
+++ proprietary/po/proprietary-manipulation.fr-en.html  10 Nov 2020 17:37:42 
-0000      1.7
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Manipulation of users is one of these malicious functionalities.
 Here are examples of programs that are designed to do this by taking
 advantage of human psychology.</p>
@@ -62,7 +62,7 @@
 href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
 which also take advantage of human psychology, but in a much more
 elaborate and dangerous way.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -167,7 +167,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-manipulation.fr.po       5 Oct 2020 13:13:25 
-0000       1.10
+++ proprietary/po/proprietary-manipulation.fr.po       10 Nov 2020 17:37:42 
-0000      1.11
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -77,7 +77,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
@@ -87,7 +87,7 @@
 "malveillantes. Voici des exemples de programmes qui sont conçus pour "
 "exploiter la psychologie humaine à cette fin."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "

Index: proprietary/po/proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-manipulation.pot 24 Jun 2020 05:37:12 -0000      
1.6
+++ proprietary/po/proprietary-manipulation.pot 10 Nov 2020 17:37:42 -0000      
1.7
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,14 +68,14 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a "
 "href=\"/proprietary/proprietary-addictions.html\">Addictive programs</a>, "

Index: proprietary/po/proprietary-manipulation.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-manipulation.ru-en.html  24 Jun 2020 05:37:12 
-0000      1.5
+++ proprietary/po/proprietary-manipulation.ru-en.html  10 Nov 2020 17:37:42 
-0000      1.6
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Manipulation of users is one of these malicious functionalities.
 Here are examples of programs that are designed to do this by taking
 advantage of human psychology.</p>
@@ -62,7 +62,7 @@
 href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
 which also take advantage of human psychology, but in a much more
 elaborate and dangerous way.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -167,7 +167,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-manipulation.ru.po       24 Jun 2020 05:04:03 
-0000      1.9
+++ proprietary/po/proprietary-manipulation.ru.po       10 Nov 2020 17:37:42 
-0000      1.10
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
@@ -89,7 +89,7 @@
 "Вот примеры программ, спроектированных, 
чтобы делать это, опираясь на "
 "человеческую психологию."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "

Index: proprietary/po/proprietary-obsolescence.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-obsolescence.es-en.html  24 Jun 2020 05:37:12 
-0000      1.7
+++ proprietary/po/proprietary-obsolescence.es-en.html  10 Nov 2020 17:37:42 
-0000      1.8
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Programmed obsolescence is one of the malicious functionalities that
 may be designed into proprietary software.</p>
 
@@ -64,7 +64,7 @@
 
 <p>Here are examples of proprietary programs that make hardware devices
 prematurely obsolete.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -210,7 +210,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-obsolescence.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-obsolescence.es.po       24 Jun 2020 05:37:12 
-0000      1.15
+++ proprietary/po/proprietary-obsolescence.es.po       10 Nov 2020 17:37:42 
-0000      1.16
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-24 12:20+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -83,7 +83,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
@@ -91,7 +91,7 @@
 "La obsolescencia programada es una de las funcionalidades maliciosas que "
 "pueden diseñarse en el software privativo."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -104,7 +104,7 @@
 "tiempo, al dejar de recibir mantenimiento, o bien a desechar equipos que "
 "podrían haberse reparado."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."

Index: proprietary/po/proprietary-obsolescence.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-obsolescence.fr-en.html  24 Jun 2020 05:37:12 
-0000      1.8
+++ proprietary/po/proprietary-obsolescence.fr-en.html  10 Nov 2020 17:37:42 
-0000      1.9
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Programmed obsolescence is one of the malicious functionalities that
 may be designed into proprietary software.</p>
 
@@ -64,7 +64,7 @@
 
 <p>Here are examples of proprietary programs that make hardware devices
 prematurely obsolete.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -210,7 +210,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-obsolescence.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary-obsolescence.fr.po       5 Oct 2020 13:13:25 
-0000       1.19
+++ proprietary/po/proprietary-obsolescence.fr.po       10 Nov 2020 17:37:42 
-0000      1.20
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2019-11-23 17:20+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
 "Language-Team: French <trad-gnu@apri.org>\n"
@@ -77,7 +77,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
@@ -85,7 +85,7 @@
 "L'obsolescence programmée est l'une des fonctionnalités malveillantes qui "
 "peuvent être intégrées au logiciel privateur."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -99,7 +99,7 @@
 "fabricant, ou à jeter des composant défectueux qui auraient pu être faits "
 "pour être réparables."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."

Index: proprietary/po/proprietary-obsolescence.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.pot,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-obsolescence.pot 24 Jun 2020 05:37:12 -0000      
1.8
+++ proprietary/po/proprietary-obsolescence.pot 10 Nov 2020 17:37:42 -0000      
1.9
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,13 +68,13 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -82,7 +82,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."

Index: proprietary/po/proprietary-obsolescence.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-obsolescence.ru-en.html  24 Jun 2020 05:37:12 
-0000      1.7
+++ proprietary/po/proprietary-obsolescence.ru-en.html  10 Nov 2020 17:37:42 
-0000      1.8
@@ -52,7 +52,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Programmed obsolescence is one of the malicious functionalities that
 may be designed into proprietary software.</p>
 
@@ -64,7 +64,7 @@
 
 <p>Here are examples of proprietary programs that make hardware devices
 prematurely obsolete.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -210,7 +210,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-obsolescence.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-obsolescence.ru.po       24 Jun 2020 05:04:03 
-0000      1.14
+++ proprietary/po/proprietary-obsolescence.ru.po       10 Nov 2020 17:37:42 
-0000      1.15
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
@@ -87,7 +87,7 @@
 "Запрограммированное 
устаревание&nbsp;&mdash;одна из вредоносных 
функций, "
 "которые могут закладываться в 
несвободные программы."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -101,7 +101,7 @@
 "приходится выбрасывать неисправную 
аппаратуру, которую можно было бы "
 "починить."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."

Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary-sabotage.de-diff.html    7 Nov 2020 10:01:59 
-0000       1.60
+++ proprietary/po/proprietary-sabotage.de-diff.html    10 Nov 2020 17:37:42 
-0000      1.61
@@ -66,11 +66,11 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Some malicious functionalities mediate sabotage, i.e. abusive
 interference of the developer into the use of the software, with harmful
 consequences for the users. Examples of such situations are listed 
below.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -897,7 +897,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/07 10:01:59 $
+$Date: 2020/11/10 17:37:42 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary/po/proprietary-sabotage.de.po   7 Nov 2020 10:01:59 -0000       
1.142
+++ proprietary/po/proprietary-sabotage.de.po   10 Nov 2020 17:37:43 -0000      
1.143
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-sabotage.es-en.html      8 Nov 2020 10:29:08 
-0000       1.20
+++ proprietary/po/proprietary-sabotage.es-en.html      10 Nov 2020 17:37:43 
-0000      1.21
@@ -52,11 +52,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Some malicious functionalities mediate sabotage, i.e. abusive
 interference of the developer into the use of the software, with harmful
 consequences for the users. Examples of such situations are listed below.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -692,7 +692,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary-sabotage.es.po   8 Nov 2020 10:17:18 -0000       
1.46
+++ proprietary/po/proprietary-sabotage.es.po   10 Nov 2020 17:37:43 -0000      
1.47
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-11-08 11:15+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-sabotage.fr-en.html      7 Nov 2020 13:01:46 
-0000       1.90
+++ proprietary/po/proprietary-sabotage.fr-en.html      10 Nov 2020 17:37:43 
-0000      1.91
@@ -52,11 +52,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Some malicious functionalities mediate sabotage, i.e. abusive
 interference of the developer into the use of the software, with harmful
 consequences for the users. Examples of such situations are listed below.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -692,7 +692,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/07 13:01:46 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary/po/proprietary-sabotage.fr.po   7 Nov 2020 12:26:44 -0000       
1.193
+++ proprietary/po/proprietary-sabotage.fr.po   10 Nov 2020 17:37:43 -0000      
1.194
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-11-07 13:25+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-sabotage.it-diff.html    7 Nov 2020 10:01:59 
-0000       1.70
+++ proprietary/po/proprietary-sabotage.it-diff.html    10 Nov 2020 17:37:43 
-0000      1.71
@@ -68,22 +68,17 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Some malicious functionalities mediate sabotage, i.e. abusive
 interference of the developer into the use of the software, with harmful
 consequences for the users. Examples of such situations</em></ins></span> are 
<span class="removed"><del><strong>examples</strong></del></span> <span 
class="inserted"><ins><em>listed below.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>proprietary software</strong></del></span> <span 
class="inserted"><ins><em>an example</em></ins></span> that <span 
class="removed"><del><strong>has something
-worse than</strong></del></span> <span class="inserted"><ins><em>ought to be 
in this page but isn't
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>proprietary software</strong></del></span> <span 
class="inserted"><ins><em>an example</em></ins></span> that <span 
class="inserted"><ins><em>ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>back door.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include the URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -93,20 +88,16 @@
   &lt;li id="M202008182"&gt;
     &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This</em></ins></span> 
will <span class="removed"><del><strong>stop</strong></del></span> <span 
class="inserted"><ins><em>give Facebook
+    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202007270"&gt;
     &lt;p&gt;The Mellow sous-vide cooker is
-    tethered to a server. The company suddenly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
-    model iThings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, Apple stops people</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
-    turned this tethering into a subscription&lt;/a&gt;, forbidding 
users</em></ins></span> from <span class="removed"><del><strong>fixing problems 
themselves;
-    that's</strong></del></span>
-    <span class="inserted"><ins><em>taking advantage of</em></ins></span> the 
<span class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;advanced features&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>the cooker
+    tethered to a server. The company suddenly &lt;a
+    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
+    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
+    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
     unless they pay a monthly fee.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -117,13 +108,12 @@
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
     software on the device.  Many employers demand to do this.  For the
     employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree</em></ins></span> software.&lt;/p&gt;
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
Microsoft</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910071"&gt;
-    &lt;p&gt;Adobe has &lt;a
+  &lt;li id="M201910071"&gt;
+    &lt;p&gt;Adobe</em></ins></span> has <span 
class="removed"><del><strong>something
+worse</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/"&gt;
     cancelled the software subscriptions of all users in
     Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
@@ -133,21 +123,29 @@
   &lt;li id="M201909160"&gt;
     &lt;p&gt;Tesla users claim Tesla &lt;a
     
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW"&gt;force-installed
-    software to cut down on battery range&lt;/a&gt;, rather than replace the
+    software to cut down on battery range&lt;/a&gt;, rather</em></ins></span> 
than <span class="inserted"><ins><em>replace the
     defective batteries. Tesla did this to avoid having to run their
     warranty.&lt;/p&gt;
 
-    &lt;p&gt;This means that proprietary software can potentially be a way to
+    &lt;p&gt;This means that proprietary software can potentially 
be</em></ins></span> a <span class="removed"><del><strong>back door.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Apple will stop</strong></del></span> <span 
class="inserted"><ins><em>way to
     commit perjury with impunity.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908130"&gt;
     &lt;p&gt;When Apple suspects a user of fraud, it
     judges the case secretly and presents the verdict
-    as a fait accompli.  The punishment to a user found guilty &lt;a
-    
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
-    being cut off for life, which more-or-less cripples the user's Apple
-    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
+    as a fait accompli.  The punishment to a user found 
guilty</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
+    being cut off</em></ins></span> for <span 
class="removed"><del><strong>older
+    model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile,</strong></del></span> <span 
class="inserted"><ins><em>life, which more-or-less cripples the 
user's</em></ins></span> Apple <span class="removed"><del><strong>stops people 
from fixing problems themselves;
+    that's</strong></del></span>
+    <span class="inserted"><ins><em>devices forever&lt;/a&gt;.  There is no 
appeal.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904041"&gt;
@@ -158,9 +156,9 @@
     versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
     
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909"&gt;
     tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
+    &ldquo;repair&rdquo; any components of</em></ins></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>updating system that users
     may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
+    them. Microsoft repeatedly pushed faulty versions</em></ins></span> of 
<span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>this program to
     users' machines, causing numerous problems, some of which &lt;a
     
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
     critical&lt;/a&gt;.&lt;/p&gt;
@@ -331,10 +329,12 @@
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
+    that's the nature of proprietary</em></ins></span> software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705180"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
Microsoft</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705180"&gt;
     &lt;p&gt;Bird and rabbit pets were implemented for Second
     Life by a company that tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
@@ -874,7 +874,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/07 10:01:59 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary/po/proprietary-sabotage.it.po   7 Nov 2020 10:01:59 -0000       
1.135
+++ proprietary/po/proprietary-sabotage.it.po   10 Nov 2020 17:37:43 -0000      
1.136
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary-sabotage.ja-diff.html    7 Nov 2020 10:02:01 
-0000       1.76
+++ proprietary/po/proprietary-sabotage.ja-diff.html    10 Nov 2020 17:37:43 
-0000      1.77
@@ -67,11 +67,11 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Some malicious functionalities mediate sabotage, i.e. abusive
 interference of the developer into the use of the software, with harmful
 consequences for the users. Examples of such situations are listed 
below.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -852,7 +852,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/07 10:02:01 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary/po/proprietary-sabotage.ja.po   7 Nov 2020 10:02:01 -0000       
1.129
+++ proprietary/po/proprietary-sabotage.ja.po   10 Nov 2020 17:37:43 -0000      
1.130
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/proprietary-sabotage.pot     7 Nov 2020 10:02:01 -0000       
1.93
+++ proprietary/po/proprietary-sabotage.pot     10 Nov 2020 17:37:43 -0000      
1.94
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary-sabotage.ru-en.html      7 Nov 2020 11:30:44 
-0000       1.88
+++ proprietary/po/proprietary-sabotage.ru-en.html      10 Nov 2020 17:37:43 
-0000      1.89
@@ -52,11 +52,11 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Some malicious functionalities mediate sabotage, i.e. abusive
 interference of the developer into the use of the software, with harmful
 consequences for the users. Examples of such situations are listed below.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -692,7 +692,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/07 11:30:44 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary/po/proprietary-sabotage.ru.po   7 Nov 2020 11:30:44 -0000       
1.227
+++ proprietary/po/proprietary-sabotage.ru.po   10 Nov 2020 17:37:43 -0000      
1.228
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "

Index: proprietary/po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-subscriptions.de-diff.html       17 Oct 2020 
08:05:09 -0000      1.30
+++ proprietary/po/proprietary-subscriptions.de-diff.html       10 Nov 2020 
17:37:43 -0000      1.31
@@ -68,7 +68,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;It sounds simple to say that a certain program &ldquo;requires a
 subscription.&rdquo;  What that means concretely is that it contains a
 time bomb, so that it will refuse to operate after that date.  Or else
@@ -78,7 +78,7 @@
 
 <span class="inserted"><ins><em>&lt;p&gt;Examples of software subscriptions 
that harmed users directly are
 given below.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -237,7 +237,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-subscriptions.de.po      17 Oct 2020 08:05:09 
-0000      1.34
+++ proprietary/po/proprietary-subscriptions.de.po      10 Nov 2020 17:37:43 
-0000      1.35
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | It sounds simple to say that a certain program &ldquo;requires a
 # | subscription.&rdquo; What that means concretely is that it contains a time
 # | bomb, so that it will refuse to operate after that date.  Or else it is <a
@@ -152,7 +152,7 @@
 "href=\"/proprietary/proprietary-tethers\">an einen Server gebunden</a> und "
 "dieser überprüft das Datum. Beides ist eine bösartige Funktionalität."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."

Index: proprietary/po/proprietary-subscriptions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-subscriptions.es-en.html 18 Oct 2020 09:59:20 
-0000      1.9
+++ proprietary/po/proprietary-subscriptions.es-en.html 10 Nov 2020 17:37:43 
-0000      1.10
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>It sounds simple to say that a certain program &ldquo;requires a
 subscription.&rdquo;  What that means concretely is that it contains a
 time bomb, so that it will refuse to operate after that date.  Or else
@@ -63,7 +63,7 @@
 
 <p>Examples of software subscriptions that harmed users directly are
 given below.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -214,7 +214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-subscriptions.es.po      18 Oct 2020 09:59:20 
-0000      1.22
+++ proprietary/po/proprietary-subscriptions.es.po      10 Nov 2020 17:37:43 
-0000      1.23
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-18 11:36+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -97,7 +97,7 @@
 "<a href=\"/proprietary/proprietary-tethers.html#about-page\">depende de un "
 "servidor</a> que comprueba la fecha. Ambas funcionalidades son maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."

Index: proprietary/po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-subscriptions.fr-en.html 17 Oct 2020 08:59:36 
-0000      1.31
+++ proprietary/po/proprietary-subscriptions.fr-en.html 10 Nov 2020 17:37:43 
-0000      1.32
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>It sounds simple to say that a certain program &ldquo;requires a
 subscription.&rdquo;  What that means concretely is that it contains a
 time bomb, so that it will refuse to operate after that date.  Or else
@@ -63,7 +63,7 @@
 
 <p>Examples of software subscriptions that harmed users directly are
 given below.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -214,7 +214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-subscriptions.fr.po      17 Oct 2020 08:29:20 
-0000      1.53
+++ proprietary/po/proprietary-subscriptions.fr.po      10 Nov 2020 17:37:43 
-0000      1.54
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -91,7 +91,7 @@
 "serveur</a> et que ce serveur vérifie la date. L'une et l'autre sont des "
 "fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."

Index: proprietary/po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-subscriptions.ja-diff.html       17 Oct 2020 
08:05:09 -0000      1.40
+++ proprietary/po/proprietary-subscriptions.ja-diff.html       10 Nov 2020 
17:37:43 -0000      1.41
@@ -67,7 +67,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;It sounds simple to say that a certain program &ldquo;requires a
 subscription.&rdquo;  What that means concretely is that it contains a
 time bomb, so that it will refuse to operate after that date.  Or else
@@ -80,7 +80,7 @@
 
 <span class="inserted"><ins><em>&lt;p&gt;Examples of software subscriptions 
that harmed users directly are
 given below.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -237,7 +237,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-subscriptions.ja.po      17 Oct 2020 08:05:09 
-0000      1.30
+++ proprietary/po/proprietary-subscriptions.ja.po      10 Nov 2020 17:37:43 
-0000      1.31
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2016-09-16 09:36+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "It sounds simple to say that a certain program &ldquo;requires a "
@@ -123,7 +123,7 @@
 
"サーバへ繋ぎ止め</a>られていて、サーバが日付をチェックします。どちらにしても"
 "悪意のある機能です。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."

Index: proprietary/po/proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-subscriptions.pot        17 Oct 2020 08:05:09 
-0000      1.27
+++ proprietary/po/proprietary-subscriptions.pot        10 Nov 2020 17:37:43 
-0000      1.28
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -78,7 +78,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."

Index: proprietary/po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-subscriptions.ru-en.html 19 Oct 2020 10:00:05 
-0000      1.31
+++ proprietary/po/proprietary-subscriptions.ru-en.html 10 Nov 2020 17:37:43 
-0000      1.32
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>It sounds simple to say that a certain program &ldquo;requires a
 subscription.&rdquo;  What that means concretely is that it contains a
 time bomb, so that it will refuse to operate after that date.  Or else
@@ -63,7 +63,7 @@
 
 <p>Examples of software subscriptions that harmed users directly are
 given below.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -214,7 +214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-subscriptions.ru.po      19 Oct 2020 10:00:05 
-0000      1.59
+++ proprietary/po/proprietary-subscriptions.ru.po      10 Nov 2020 17:37:43 
-0000      1.60
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -94,7 +94,7 @@
 "proprietary/proprietary-tethers.html#about-page\">привязана к 
серверу</a>, а "
 "сервер проверяет дату. И то, и другое 
является вредоносной функцией."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/proprietary-surveillance.de-diff.html        2 Nov 2020 
17:32:39 -0000       1.137
+++ proprietary/po/proprietary-surveillance.de-diff.html        10 Nov 2020 
17:37:43 -0000      1.138
@@ -107,7 +107,7 @@
 &lt;/div&gt;
 
 &lt;div <span 
class="removed"><del><strong>class="toc"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;A common malicious functionality is to snoop on the user.  This page
 records &lt;strong&gt;clearly established cases of proprietary software that
 spies on or tracks users&lt;/strong&gt;.  Manufacturers even refuse
@@ -119,7 +119,7 @@
 have their own page: &lt;a
 href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
 Tethers&lt;/a&gt;.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important" style="clear: both"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -257,14 +257,15 @@
 &lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>the dates of publication of linked articles.
 The latest additions are listed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
-&lt;div</strong></del></span> <span class="inserted"><ins><em>the &lt;a
+&lt;div class="big-section"&gt;
+  &lt;h3</strong></del></span> <span class="inserted"><ins><em>the &lt;a
 href="/proprietary/proprietary.html#latest"&gt;main page&lt;/a&gt; of the
 Malware section.&lt;/p&gt;
 
 
 
-&lt;div</em></ins></span> class="big-section"&gt;
-  &lt;h3 id="OSSpyware"&gt;Spyware in <span 
class="removed"><del><strong>Operating Systems&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Laptops and 
Desktops&lt;/h3&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3</em></ins></span> id="OSSpyware"&gt;Spyware in <span 
class="removed"><del><strong>Operating Systems&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Laptops and 
Desktops&lt;/h3&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#OSSpyware"&gt;#OSSpyware&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -622,9 +623,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>these apps.&lt;/p&gt;
-
-  &lt;p&gt;On the other hand,</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    &lt;p&gt;The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
     proprietary software to make sure they can't &ldquo;fool&rdquo;
@@ -1225,7 +1224,9 @@
     data they collected would go to Facebook as well.&lt;/p&gt;
 
     &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+    developers</em></ins></span> of <span class="removed"><del><strong>these 
apps.&lt;/p&gt;
+
+  &lt;p&gt;On the</strong></del></span> other <span 
class="removed"><del><strong>hand,</strong></del></span> <span 
class="inserted"><ins><em>nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
@@ -3856,7 +3857,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 17:32:39 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.351
retrieving revision 1.352
diff -u -b -r1.351 -r1.352
--- proprietary/po/proprietary-surveillance.de.po       2 Nov 2020 17:32:40 
-0000       1.351
+++ proprietary/po/proprietary-surveillance.de.po       10 Nov 2020 17:37:43 
-0000      1.352
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -136,7 +136,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "„Woher wussten sie, dass ich ein Hund bin?“"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -145,7 +145,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-surveillance.es-en.html  3 Nov 2020 12:00:44 
-0000       1.28
+++ proprietary/po/proprietary-surveillance.es-en.html  10 Nov 2020 17:37:43 
-0000      1.29
@@ -75,7 +75,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A common malicious functionality is to snoop on the user.  This page
 records <strong>clearly established cases of proprietary software that
 spies on or tracks users</strong>.  Manufacturers even refuse
@@ -87,7 +87,7 @@
 have their own page: <a
 href="/proprietary/proprietary-tethers.html#about-page">Proprietary
 Tethers</a>.</p>
-</div>
+</blockquote>
 
 <div class="important" style="clear: both">
 <p>If you know of an example that ought to be in this page but isn't
@@ -2771,7 +2771,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/03 12:00:44 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/proprietary-surveillance.es.po       3 Nov 2020 12:00:44 
-0000       1.95
+++ proprietary/po/proprietary-surveillance.es.po       10 Nov 2020 17:37:43 
-0000      1.96
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-11-03 12:12+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -99,7 +99,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "«¿Cómo habrán descubierto que soy un perro?»"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -114,7 +114,7 @@
 "com/2018/10/19/smart-home-devices-hoard-data-government-demands/\">decir si "
 "espían a los usuarios por cuenta del Estado</a>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary/po/proprietary-surveillance.fr-en.html  2 Nov 2020 18:03:09 
-0000       1.225
+++ proprietary/po/proprietary-surveillance.fr-en.html  10 Nov 2020 17:37:43 
-0000      1.226
@@ -75,7 +75,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A common malicious functionality is to snoop on the user.  This page
 records <strong>clearly established cases of proprietary software that
 spies on or tracks users</strong>.  Manufacturers even refuse
@@ -87,7 +87,7 @@
 have their own page: <a
 href="/proprietary/proprietary-tethers.html#about-page">Proprietary
 Tethers</a>.</p>
-</div>
+</blockquote>
 
 <div class="important" style="clear: both">
 <p>If you know of an example that ought to be in this page but isn't
@@ -2771,7 +2771,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.555
retrieving revision 1.556
diff -u -b -r1.555 -r1.556
--- proprietary/po/proprietary-surveillance.fr.po       2 Nov 2020 17:49:26 
-0000       1.555
+++ proprietary/po/proprietary-surveillance.fr.po       10 Nov 2020 17:37:43 
-0000      1.556
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-11-02 18:46+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -94,7 +94,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "« Comment ont-ils découvert que je suis un chien ? »"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -109,7 +109,7 @@
 "techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
 "\">dire s'ils espionnent l'utilisateur au profit de l'État</a>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary/po/proprietary-surveillance.it-diff.html        2 Nov 2020 
17:32:40 -0000       1.203
+++ proprietary/po/proprietary-surveillance.it-diff.html        10 Nov 2020 
17:37:43 -0000      1.204
@@ -107,7 +107,7 @@
 &lt;/div&gt;
 
 &lt;div <span 
class="removed"><del><strong>class="toc"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;A common malicious functionality is to snoop on the user.  This page
 records &lt;strong&gt;clearly established cases of proprietary software that
 spies on or tracks users&lt;/strong&gt;.  Manufacturers even refuse
@@ -119,7 +119,7 @@
 have their own page: &lt;a
 href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
 Tethers&lt;/a&gt;.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important" style="clear: both"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -192,15 +192,15 @@
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;JavaScript&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInVR"&gt;Spyware In 
VR&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;Flash&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;/ul&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
     <span class="inserted"><ins><em>&lt;h4&gt;&lt;a 
href="#SpywareInNetworks"&gt;Spyware in 
Networks&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;div <span class="removed"><del><strong>style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;!-- #Introduction --&gt;
+&lt;!-- #Introduction --&gt;</strong></del></span>
 
-&lt;div</strong></del></span> class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="Introduction"&gt;Introduction&lt;/h3&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -301,11 +301,11 @@
     
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
     by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
+    &lt;p&gt;The &lt;a
+    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
-    engineers to access, among other things, registry keys &lt;a
-    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    engineers to access, among other things, registry keys</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
     which can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -411,25 +411,21 @@
 
   &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
 
-    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>uses Windows 10's &ldquo;privacy policy&rdquo; to 
overtly impose a
-  &ldquo;right&rdquo; to</strong></del></span> look at users' files <span 
class="removed"><del><strong>at any time. Windows 10 full disk
-  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
-  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Thus, Windows is</strong></del></span> <span 
class="inserted"><ins><em>for the US government
-    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
-    say so. Will it look at users' files for the Chinese government
+    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>uses Windows 10's</strong></del></span> <span 
class="inserted"><ins><em>look at users' files for the US government
+    on demand, though the</em></ins></span> &ldquo;privacy policy&rdquo; <span 
class="removed"><del><strong>to overtly impose a
+  &ldquo;right&rdquo; to</strong></del></span> <span 
class="inserted"><ins><em>does not explicitly
+    say so. Will it</em></ins></span> look at users' files <span 
class="removed"><del><strong>at</strong></del></span> <span 
class="inserted"><ins><em>for the Chinese government
     on demand?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506170"&gt;
     &lt;p&gt;Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
     to overtly impose a &ldquo;right&rdquo; to look at
-    users' files at any time. Windows 10 full disk encryption &lt;a
-    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+    users' files at</em></ins></span> any time. Windows 10 full disk 
encryption &lt;a <span 
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</em></ins></span>
     gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Thus, Windows is</em></ins></span> overt malware in regard to 
surveillance, as in
+    &lt;p&gt;Thus, Windows is overt malware in regard to surveillance, as in
     other issues.&lt;/p&gt;
 
     &lt;p&gt;We can suppose Microsoft look at users' files for the US 
government
@@ -580,17 +576,31 @@
 
   &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
   but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install is not really clean 
since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
   It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
+  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span> <span 
class="inserted"><ins><em>not really clean since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts</em></ins></span> in <span class="removed"><del><strong>stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
     own malware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
+  &lt;p&gt;Pairs of Android</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -608,95 +618,93 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006260"&gt;
-    &lt;p&gt;Most apps are malware, but
-    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    &lt;p&gt;Most</em></ins></span> apps <span 
class="removed"><del><strong>can collude to transmit users' personal
+       data to servers.</strong></del></span> <span 
class="inserted"><ins><em>are malware, but
+    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop</em></ins></span> on 
<span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps,</strong></del></span> users <span 
class="removed"><del><strong>could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>as well
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
-    approach, but</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>does not tell us whether it has functionalities we
-    consider malicious, such as sending data the user has not explicitly
-    asked to send.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make 
sure they can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span> <span 
class="inserted"><ins><em>Biden's</em></ins></span> app <span 
class="removed"><del><strong>developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span> <span 
class="inserted"><ins><em>has a less manipulative overall
+    approach, but</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>does not tell us whether it has functionalities we
+    consider malicious, such as sending data</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>user has not explicitly
+    asked to send.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps</strong></del></span>
+  &lt;li id="M201601110"&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what</strong></del></span> <span class="inserted"><ins><em>make 
sure</em></ins></span> they <span class="removed"><del><strong>are 
&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>can't &ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>information it collects on users, 
instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude</strong></del></span> <span 
class="inserted"><ins><em>take over
+  &lt;li id="M201510050"&gt;
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Edward Snowden, 
&lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>turn the 
phones on and off, listen</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>off, 
listen to</em></ins></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;
+    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    text messages, read call,</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>and web browsing history, and
+    read</em></ins></span> the <span 
class="removed"><del><strong>tracking.</strong></del></span> <span 
class="inserted"><ins><em>contact list.</em></ins></span> This <span 
class="inserted"><ins><em>malware</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
+    from investigation.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201311120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>does not 
operate via</em></ins></span>
-    the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
-    phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
-    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>universal back door 
that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send</em></ins></span> their <span class="inserted"><ins><em>GPS 
location on remote command, and</em></ins></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
+    to <span class="removed"><del><strong>the app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -706,100 +714,81 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009183"&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their</strong></del></span>
+    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>by 
surreptitously turning on the device's
-    camera.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    on Instagram&lt;/a&gt; users by surreptitously turning 
on</em></ins></span> the <span class="removed"><del><strong>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to</strong></del></span>
+  &lt;p&gt;The article should</strong></del></span> <span 
class="inserted"><ins><em>device's
+    camera.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M202004200"&gt;
+  &lt;li id="M202004200"&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice of surreptitiously activating</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>Siri software 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had</em></ins></span> not <span 
class="removed"><del><strong>have described</strong></del></span> <span 
class="inserted"><ins><em>activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to</em></ins></span> these <span 
class="removed"><del><strong>apps as
+  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>recordings, in a group that made
+    transcripts of them. He does</em></ins></span> not <span 
class="removed"><del><strong>free software.  The clear</strong></del></span> 
<span class="inserted"><ins><em>believes that Apple has ceased this
+    practice.&lt;/p&gt;
 
-  &lt;p&gt;The article should</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
-    record users' conversations when they had</em></ins></span> not <span 
class="removed"><del><strong>have described these apps as
-  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>activated Siri&lt;/a&gt;.
-    This was</em></ins></span> not <span class="removed"><del><strong>free 
software.  The clear way</strong></del></span> <span 
class="inserted"><ins><em>just occasional, it was systematic practice.&lt;/p&gt;
-
-    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen to these recordings, in a group that made
-    transcripts of them. He does not believes that Apple has ceased this
-    practice.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The only reliable</em></ins></span> way to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>article 
takes</strong></del></span> <span class="inserted"><ins><em>only reliable way 
to prevent this is,</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>prevent this is,</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools are
   legitimate, but is</strong></del></span> <span 
class="inserted"><ins><em>program</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no 
right</strong></del></span>
     <span class="inserted"><ins><em>controls access</em></ins></span> to
-  <span class="removed"><del><strong>analyze what</strong></del></span> <span 
class="inserted"><ins><em>the microphone to decide when the user has
-    &ldquo;activated&rdquo; any service, to be free software, and the
-    operating system under it free as well. This way,</em></ins></span> users 
<span class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>could make
-    sure Apple can't listen to them.&lt;/p&gt;
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  just as wrong as</strong></del></span> <span class="inserted"><ins><em>the 
microphone to decide when the user has
+    &ldquo;activated&rdquo;</em></ins></span> any <span 
class="removed"><del><strong>other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect</strong></del></span> <span 
class="inserted"><ins><em>service,</em></ins></span> to <span 
class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>be free software,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android</strong></del></span>
+    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
+    sure Apple can't listen</em></ins></span> to <span 
class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites of political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis 
Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>(but not</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
-    and DoorDash. But it</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are 
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most 
nonfree apps contain
-    trackers.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>of these</em></ins></span> send <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>personally identifying</em></ins></span> data <span 
class="removed"><del><strong>to Motorola&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing</em></ins></span> data <span class="inserted"><ins><em>from 
Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Some manufacturers add a
       &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package</strong></del></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>the Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive</em></ins></span> make 
<span class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -811,7 +800,32 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that 
are busy at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But it</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span> <span class="inserted"><ins><em>likely that 
most nonfree apps contain
+    trackers. Some</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>these send personally identifying</em></ins></span> 
data <span class="removed"><del><strong>to Apple's 
servers&lt;/a&gt;.</strong></del></span> <span class="inserted"><ins><em>such 
as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -825,21 +839,17 @@
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple</em></ins></span> proposes &lt;a
+    &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
-      &mdash; which</strong></del></span> <span 
class="inserted"><ins><em>screen&lt;/a&gt;&mdash;which</em></ins></span> would 
mean no way
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data to Apple's servers&lt;/a&gt;.</em></ins></span>  Big 
Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -927,19 +937,19 @@
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or 
it</em></ins></span>
+    is <span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
+    &lt;p&gt;The iThing</em></ins></span> also <span 
class="removed"><del><strong>a feature for web sites</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature for web sites</em></ins></span> to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
@@ -1021,35 +1031,29 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't</em></ins></span> send <span 
class="removed"><del><strong>so much</strong></del></span> <span 
class="inserted"><ins><em>the location</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>while in
+    in airplane mode. It didn't</em></ins></span> send <span 
class="removed"><del><strong>so much</strong></del></span> <span 
class="inserted"><ins><em>the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>Google &lt;a
+    &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>user, clearly must constitute 
spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone <span 
class="inserted"><ins><em>has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
     disable Google Play itself to completely stop the tracking.  This is
@@ -1061,15 +1065,20 @@
   &lt;li id="M201507030"&gt;
     &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
+    that users can't delete&lt;/a&gt;, and they send so much</em></ins></span> 
data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;
+    of some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</em></ins></span>
+    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
@@ -1114,95 +1123,68 @@
     &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
       it tries to get</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>users is not enough</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms and Conditions&rdquo;</em></ins></span> 
that <span class="inserted"><ins><em>spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install</strong></del></span> <span 
class="inserted"><ins><em>collects</em></ins></span> on <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>users, instead</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
-   information about the users' searches that</strong></del></span>
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
-
-    &lt;p&gt;However, to truly protect people's privacy, we must 
prevent</em></ins></span> Google <span class="removed"><del><strong>normally 
gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
-    and <span class="inserted"><ins><em>other companies from getting this 
personal information in</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, 
judging</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
-    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    the e-reader used</em></ins></span> by <span 
class="inserted"><ins><em>most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of</em></ins></span> data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets 
when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</em></ins></span>
 they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+   &lt;p&gt;Currently,</strong></del></span>
+    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the <span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1222,25 +1204,43 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
     &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to &lt;a
-    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
-    removed the problematic extensions from their stores, but this shows
-    once more</em></ins></span> how <span 
class="removed"><del><strong>&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are 
supposed
+    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>users' 
detailed browsing habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="inserted"><ins><em>Google
+    removed</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
+    once more how unsafe nonfree software can be. Tools that are supposed
     to protect a proprietary system are, instead, infecting it with
-    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;The fact that this is used</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software</em></ins></span>
+    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
     is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
         surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
     paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
@@ -1504,17 +1504,17 @@
     these apps, even if someone offers you a reward to do so. A
     free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>same thing without
     spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
+       was sued for collecting lots</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android 
phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
@@ -1766,19 +1766,9 @@
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of</strong></del></span> data <span 
class="removed"><del><strong>to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it obtains from the same machine via
+      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>the app; others only 
say that the user is
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
@@ -1786,249 +1776,145 @@
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>system has 
no authentication</strong></del></span> <span class="inserted"><ins><em>user's 
location even</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>tricked by</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables the phone company to track</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>and listens through</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
-    and collect</em></ins></span> information about <span 
class="removed"><del><strong>drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really a matter of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
-    source code they cannot look at.</em></ins></span>  The other
-      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps 
might be snooping</em></ins></span>
-    in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company says it 
doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>free software
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information</em></ins></span> 
about <span class="inserted"><ins><em>its users.
+    &lt;p&gt;Grindr should not have so much information about its users.
     It could be designed so that users communicate such info to each
-    other but not to</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
-    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>joke: The 
other day</strong></del></span> <span class="inserted"><ins><em>user's 
movements around</em></ins></span> a <span class="removed"><del><strong>woman 
came up to me</strong></del></span> <span class="inserted"><ins><em>physical 
store by noticing WiFi
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the words
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="inserted"><ins><em>sent them and 
text messages and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did</em></ins></span> not <span 
class="removed"><del><strong>just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>image is 
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of 
these apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>other 
hand, Google redistributes nonfree Android apps, and
-    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span class="inserted"><ins><em>responsibility 
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their 
being
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="inserted"><ins><em>better job of preventing apps from
-    cheating? There is no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
-    to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in</strong></del></span> <span class="inserted"><ins><em>source code 
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not 
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and 
study</em></ins></span>
-    the <span class="removed"><del><strong>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>source code somehow to determine whether they 
mistreat users in
-    various ways. If it did a good job of this, it could 
more</em></ins></span> or less <span class="removed"><del><strong>all 
&ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span>
-    <span class="inserted"><ins><em>prevent such snooping, except 
when</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
-    enough</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span>
-    <span class="inserted"><ins><em>public, so we can depend</em></ins></span> 
on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>each 
other.&lt;/p&gt;
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being 
watched</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by
-      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
-      social media participation, Tivo can now</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound 
from beacons placed in stores or played</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and</strong></del></span> TV <span 
class="removed"><del><strong>advertisements play inaudible 
sounds</strong></del></span>
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>do lots 
of surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
-      range so as to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2509,9 +2395,8 @@
   &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices in range so as to</em></ins></span> determine that they
-    are <span class="removed"><del><strong>nearby.  Once your
-      Internet devices are paired</strong></del></span> <span 
class="inserted"><ins><em>nearby.  Once your Internet devices are paired with
+    on other devices in range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
@@ -2800,13 +2685,22 @@
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
     out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+    this new feature and offering it to customers who pay for 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span>
 
-  &lt;li id="M202006300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M202006300"&gt;
     &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    coerce workers into installing</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span> <span 
class="inserted"><ins><em>their own computers&lt;/a&gt;, so the
     bosses can spy on them.&lt;/p&gt;
 
     &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
@@ -2825,8 +2719,8 @@
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
     out any significant surveillance if the devices implemented proper
-    security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used by their
+    security, including encryption. But many devices</em></ins></span> with 
<span class="removed"><del><strong>nonfree</strong></del></span> <span 
class="inserted"><ins><em>proprietary</em></ins></span>
+    software <span class="inserted"><ins><em>lack this. Of course, they are 
also used by their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2861,88 +2755,170 @@
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+    the devices</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span> 
<span class="inserted"><ins><em>tethered to. Moreover, they are made available 
to
+    Alexa. As a result, Amazon</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
+    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn</em></ins></span> it <span class="removed"><del><strong>doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span> <span class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804140"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>woman came 
up to me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+  &lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="inserted"><ins><em>products are designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any 
way</em></ins></span> of <span 
class="inserted"><ins><em>making</em></ins></span>
+    a <span class="removed"><del><strong>way to
+    disable the surveillance, even</strong></del></span> <span 
class="inserted"><ins><em>device that can obey your voice commands without 
potentially spying
+    on you.  Even</em></ins></span> if it <span 
class="removed"><del><strong>were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on their 
<span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2956,10 +2932,12 @@
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This <span class="removed"><del><strong>shows that laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>will teach the 
sheeple</em></ins></span> to <span class="removed"><del><strong>get users' 
formal
+      consent before collecting personal data are totally inadequate.
+      And</strong></del></span> <span class="inserted"><ins><em>find it normal 
that companies
+    monitor every aspect of</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2970,27 +2948,40 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. They &lt;a
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security 
flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    permit security breakers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>and from</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>this article 
misuses</em></ins></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
 
-  &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>an Android 
app &lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407090"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
@@ -3011,37 +3002,46 @@
     upload data to AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can
-      <span class="removed"><del><strong>correlate ads</strong></del></span>
-    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If you want
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
     GPS navigation, get a separate navigator which runs free software
-    and works</em></ins></span> with <span class="removed"><del><strong>Web 
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street 
Map.&lt;/p&gt;
+    and works</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;
+    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data is nearly impossible, 
as it involves
+    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
-      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Tesla cars collect lots of personal data, and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
+    when they go</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>a junkyard the 
driver's personal data goes with
     them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>the 
internal car network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of 
data,
     including car location. This feature operates even when the ignition
-    key is removed, and users report that they can't disable it.&lt;/p&gt;
+    key is removed, and users report</em></ins></span> that they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
@@ -3657,7 +3657,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 17:32:40 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary/po/proprietary-surveillance.it.po       2 Nov 2020 17:32:41 
-0000       1.363
+++ proprietary/po/proprietary-surveillance.it.po       10 Nov 2020 17:37:43 
-0000      1.364
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -133,7 +133,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Come fanno a sapere che sono un cane?&rdquo;"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -142,7 +142,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary/po/proprietary-surveillance.ja-diff.html        2 Nov 2020 
17:32:41 -0000       1.221
+++ proprietary/po/proprietary-surveillance.ja-diff.html        10 Nov 2020 
17:37:43 -0000      1.222
@@ -107,7 +107,7 @@
 &lt;/div&gt;
 
 &lt;div <span 
class="removed"><del><strong>class="toc"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;A common malicious functionality is to snoop on the user.  This page
 records &lt;strong&gt;clearly established cases of proprietary software that
 spies on or tracks users&lt;/strong&gt;.  Manufacturers even refuse
@@ -119,7 +119,7 @@
 have their own page: &lt;a
 href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
 Tethers&lt;/a&gt;.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important" style="clear: both"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -192,15 +192,15 @@
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;JavaScript&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInVR"&gt;Spyware In 
VR&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;Flash&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;/ul&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
     <span class="inserted"><ins><em>&lt;h4&gt;&lt;a 
href="#SpywareInNetworks"&gt;Spyware in 
Networks&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;div <span class="removed"><del><strong>style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;!-- #Introduction --&gt;
+&lt;!-- #Introduction --&gt;</strong></del></span>
 
-&lt;div</strong></del></span> class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="Introduction"&gt;Introduction&lt;/h3&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -446,7 +446,8 @@
     voice input.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
+      Windows 8.1</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201401150"&gt;
     &lt;p id="baidu-ime"&gt;&lt;a
@@ -458,8 +459,8 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on the user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
-    Windows 8.1 snoops on local <span 
class="removed"><del><strong>searches.&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
+    Windows 8.1</em></ins></span> snoops on local <span 
class="removed"><del><strong>searches.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;And</strong></del></span> <span 
class="inserted"><ins><em>searches&lt;/a&gt;. And</em></ins></span> there's a 
&lt;a
@@ -607,9 +608,9 @@
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;The article <span class="removed"><del><strong>takes for 
granted</strong></del></span> <span 
class="inserted"><ins><em>says</em></ins></span> that <span 
class="removed"><del><strong>the usual analytics tools are
-  legitimate,</strong></del></span> <span class="inserted"><ins><em>Biden's 
app has a less manipulative overall
-    approach,</em></ins></span> but <span class="removed"><del><strong>is that 
valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> that <span class="removed"><del><strong>snoop are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>Biden's app has a 
less manipulative overall
+    approach, but</em></ins></span> that <span 
class="removed"><del><strong>snoop are
   just as wrong</strong></del></span> <span class="inserted"><ins><em>does not 
tell us whether it has functionalities we
     consider malicious, such</em></ins></span> as <span 
class="removed"><del><strong>any other snooping.&lt;/p&gt;
   &lt;/li&gt;
@@ -641,57 +642,80 @@
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
       Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>text messages which enable
-    them</em></ins></span> to <span class="removed"><del><strong>any 
file</strong></del></span> <span class="inserted"><ins><em>turn the 
phones</em></ins></span> on <span class="inserted"><ins><em>and off, listen 
to</em></ins></span> the <span class="removed"><del><strong>system.&lt;/p&gt;
+    them</em></ins></span> to <span class="removed"><del><strong>any file 
on</strong></del></span> <span class="inserted"><ins><em>turn</em></ins></span> 
the <span class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from the GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201311120"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>smart phones, including iPhones,
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal</strong></del></span> <span 
class="inserted"><ins><em>and off, listen to the microphone,
+    retrieve geo-location</em></ins></span> data <span 
class="inserted"><ins><em>from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span> <span 
class="inserted"><ins><em>disguise itself</em></ins></span>
+    from <span 
class="removed"><del><strong>there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>investigation.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</em></ins></span>
-    lots of <span class="removed"><del><strong>personal data to Apple's 
servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    detail here, it seems</em></ins></span> that <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving the code Apple
+      sends to it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots</em></ins></span> of <span class="inserted"><ins><em>bugs 
in</em></ins></span> the <span class="removed"><del><strong>most popular iOS 
apps</strong></del></span> <span class="inserted"><ins><em>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+    will send</em></ins></span> their <span class="inserted"><ins><em>GPS 
location on remote command, and</em></ins></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's 
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require</em></ins></span> 
all <span class="removed"><del><strong>the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -703,401 +727,556 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009183"&gt;
-    &lt;p&gt;Facebook &lt;a
-    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users by surreptitously turning 
on</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device's
-    camera.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make 
an</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202004200"&gt;
-    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports 
that</em></ins></span> Apple <span 
class="removed"><del><strong>ID</strong></del></span>
-    <span class="inserted"><ins><em>made a practice of surreptitiously 
activating the Siri software to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops</em></ins></span>
+    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>Instagram&lt;/a&gt; users</em></ins></span> by 
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>device's
+    camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004200"&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>practice of surreptitiously activating the Siri 
software</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
-    This was not just occasional, it was systematic practice.&lt;/p&gt;
+    This was not just occasional,</em></ins></span> it <span 
class="removed"><del><strong>still counts as</strong></del></span> <span 
class="inserted"><ins><em>was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>group that made
+    transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He 
does not believes that Apple has ceased</em></ins></span> this
+    <span class="inserted"><ins><em>practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is, 
for the program that
+    controls access</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>the 
microphone</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving</strong></del></span> <span 
class="inserted"><ins><em>listen to these recordings, in</em></ins></span> a 
<span class="removed"><del><strong>valid email address</strong></del></span> 
<span class="inserted"><ins><em>group that made
-    transcripts of them. He does not believes that Apple has ceased this
-    practice.&lt;/p&gt;
-
-    &lt;p&gt;The only reliable way to prevent this is, for the program that
-    controls access to the microphone to decide when the user has
-    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> the <span 
class="removed"><del><strong>code</strong></del></span>
-    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could make
-    sure</em></ins></span> Apple
-      <span class="removed"><del><strong>sends</strong></del></span> <span 
class="inserted"><ins><em>can't listen</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>decide when</em></ins></span> the <span 
class="removed"><del><strong>&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
+      and get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+  &lt;li&gt;&lt;p&gt;There is also a feature for web 
sites</strong></del></span> <span class="inserted"><ins><em>user has
+    &ldquo;activated&rdquo; any service,</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span> <span class="inserted"><ins><em>be free software, and 
the
+    operating system under</em></ins></span> it
+      <span class="removed"><del><strong>is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells</strong></del></span> <span class="inserted"><ins><em>free as 
well. This way, users could make
+    sure</em></ins></span> Apple <span class="removed"><del><strong>its 
geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can't listen to them.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201910131"&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China to</em></ins></span> the 
<span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black 
list</em></ins></span> most <span class="removed"><del><strong>popular iOS apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
-    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing</em></ins></span> data from <span 
class="removed"><del><strong>iPhones for the state&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either</strong></del></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the 
data</strong></del></span> <span 
class="inserted"><ins><em>devices</em></ins></span> in <span 
class="removed"><del><strong>an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite of</em></ins></span> Apple's <span 
class="removed"><del><strong>servers all the photos and
-      videos they make.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>China</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> the
+      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>supposed commitment</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits you make</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers 
that</em></ins></span> are <span class="removed"><del><strong>automatically 
updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature 
is</strong></del></span> <span class="inserted"><ins><em>busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>check URLs that possibly 
correspond</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;fraudulent&rdquo; websites. Since 
Tencent collaborates
+    with</em></ins></span> the <span class="removed"><del><strong>phones
+      on and off, listen to</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most 
certainly
+    contains</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>websites of 
political opponents. By linking the requests
+    originating</em></ins></span> from <span class="inserted"><ins><em>single 
IP addresses,</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>government can identify
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>read the contact list. This malware is designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>are 
busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
+    Channel (owned by IBM), the crime-alert service Citizen, 
Yelp</em></ins></span>
+    and <span class="removed"><del><strong>they send so much 
data</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it is 
likely</em></ins></span> that <span class="removed"><del><strong>their 
transmission is a
+      substantial expense for users.  Said transmission, not 
wanted</strong></del></span> <span class="inserted"><ins><em>most nonfree apps 
contain
     trackers. Some of these send personally identifying data such as phone
-    fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    fingerprint, exact location, email address, phone number</em></ins></span> 
or
+      <span class="removed"><del><strong>requested by</strong></del></span> 
<span class="inserted"><ins><em>even
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>case</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>company, there is no telling what it will be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
     illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>FBI can remotely activate</strong></del></span> 
<span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>GPS 
and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>Bluetooth the obvious way</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want to be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="inserted"><ins><em>use it without having your fingerprints 
taken. Users would</em></ins></span> have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose 
is</strong></del></span>
+    <span class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>tell whether</em></ins></span> the <span 
class="removed"><del><strong>use of data</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping</em></ins></span> on <span 
class="removed"><del><strong>the user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
-    and videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data</em></ins></span> to <span 
class="inserted"><ins><em>Apple's servers&lt;/a&gt;.  Big Brother 
can</em></ins></span> get <span class="removed"><del><strong>the user's list of 
other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>them from 
there.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>user types 
into it&lt;/a&gt;;</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>server records these 
numbers</em></ins></span> for <span class="removed"><del><strong>surveillance 
is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>at least 30 days.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers</em></ins></span> 
all <span class="removed"><del><strong>conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>the photos</em></ins></span>
+    and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic</strong></del></span> <span 
class="inserted"><ins><em>videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud</em></ins></span> Photo <span 
class="removed"><del><strong>app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's</strong></del></span> <span 
class="inserted"><ins><em>Library stores every</em></ins></span> photo <span 
class="removed"><del><strong>collections for known 
faces&lt;/a&gt;,</strong></del></span> and <span 
class="removed"><del><strong>suggests</strong></del></span> <span 
class="inserted"><ins><em>video</em></ins></span> you
+    <span class="inserted"><ins><em>take, and keeps them up</em></ins></span> 
to <span class="removed"><del><strong>share the picture</strong></del></span> 
<span class="inserted"><ins><em>date on all your devices. Any 
edits</em></ins></span> you <span class="removed"><del><strong>take according 
to who</strong></del></span>
+    <span class="inserted"><ins><em>make are automatically updated everywhere. 
[&hellip;] &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span>
+    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way to
-    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
     iCloud&lt;/a&gt;, but it's active by default so it still counts as a
     surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    &lt;p&gt;Unknown people apparently took advantage of 
this</em></ins></span> to <span class="removed"><del><strong>some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    nude photos of many celebrities&lt;/a&gt;. They needed</em></ins></span> 
to <span class="removed"><del><strong>be
+      sent across the wire</strong></del></span> <span 
class="inserted"><ins><em>break Apple's
+    security</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>get at them, but NSA can access any</em></ins></span> 
of <span class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if the user didn't 
&ldquo;upload&rdquo;</strong></del></span> them <span 
class="removed"><del><strong>to the service.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>regularly 
does,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, 
and</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract</em></ins></span> some
+      <span class="removed"><del><strong>are starting to realize that it is 
nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>data from iPhones for</em></ins></span> the <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
-    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
+    &lt;p&gt;This may have improved with</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not</em></ins></span> as <span class="removed"><del><strong>a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
 
-  &lt;li id="M201407230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
+    for <span class="removed"><del><strong>mobile devices report 
which</strong></del></span> <span class="inserted"><ins><em>no possible 
purpose</em></ins></span> other
+    <span class="removed"><del><strong>apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least</strong></del></span> <span 
class="inserted"><ins><em>than surveillance&lt;/a&gt;.  Here</em></ins></span> 
is <span class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get</em></ins></span> other info too.&lt;/p&gt;
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
+  &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    Either Apple helps the NSA</em></ins></span> snoop on <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>addition to
+      the snooping done by the phone company, and 
perhaps</strong></del></span> <span class="inserted"><ins><em>an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;
-  &lt;/li&gt;
+    tells Apple its geolocation&lt;/a&gt;</em></ins></span> by <span 
class="removed"><del><strong>the OS in the
+      phone.&lt;/p&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>default, though that can</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span>
+    <span class="inserted"><ins><em>turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
-      turned off.&lt;/p&gt;
+  &lt;li id="M201210170"&gt;
+    &lt;p&gt;There</em></ins></span> is <span class="removed"><del><strong>no 
excuse</strong></del></span> <span class="inserted"><ins><em>also a 
feature</em></ins></span> for <span 
class="removed"><del><strong>malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
-    to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>web sites to track users, which is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled</em></ins></span> by <span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data to the app developer but did not
+      ask</strong></del></span> <span 
class="inserted"><ins><em>default&lt;/a&gt;.  (That article 
talks</em></ins></span> about <span 
class="removed"><del><strong>sending</strong></del></span> <span 
class="inserted"><ins><em>iOS 6, but</em></ins></span> it <span 
class="inserted"><ins><em>is
+    still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
-    to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>other companies.  This shows the
+      weakness of the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving</em></ins></span> a <span class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>valid
+    email address and receiving the verification code Apple 
sends</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
+    &lt;p&gt;Xiaomi phones &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
     visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other nonfree programs snoop too. For instance, 
Spotify</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span>
-    <span class="inserted"><ins><em>other streaming dis-services make a 
dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves</em></ins></span> to <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the 
culprits are not Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
+    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services make a dossier about each user, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make</em></ins></span>
+    users identify themselves <span class="removed"><del><strong>and then 
sends personal data about them</strong></del></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
+
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
-    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>track location even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;</em></ins></span>
+    it <span class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>saved up the data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
     even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;ul&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some
-      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;
+       &lt;p&gt;The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If it sells 
the</strong></del></span> data to <span class="removed"><del><strong>a
+        data broker, the data broker can figure out who the user 
is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120"&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>system.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+      &lt;p&gt;The app reports the temperature</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone in Android phones
-    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="inserted"><ins><em>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute by
+      minute (thus, indirectly, whether it is surrounded by a person's
+      body),</strong></del></span> <span class="inserted"><ins><em>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This is
+    yet another example of nonfree software pretending to 
obey</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>user,
+    when it's actually doing something else.  Such</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>thing</em></ins></span> would <span 
class="removed"><del><strong>make statements about
+      their products, rather than</strong></del></span> <span 
class="inserted"><ins><em>be almost
+    unthinkable with</em></ins></span> free <span 
class="removed"><del><strong>software which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
-      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other 
people's</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola</em></ins></span> phone
-      <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>any file</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; 
on</strong></del></span> <span class="inserted"><ins><em>microphone in Android 
phones
+    and laptops&lt;/a&gt; (presumably</em></ins></span> Windows <span 
class="removed"><del><strong>installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>laptops).  Here</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span>
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a 
protection against massive
-        surveillance.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> <span 
class="inserted"><ins><em>not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on</strong></del></span> <span 
class="inserted"><ins><em>spell out</em></ins></span> what <span 
class="removed"><del><strong>radio and TV programs</strong></del></span>
-    <span class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
-    honestly identify the information it collects</em></ins></span> on <span 
class="removed"><del><strong>various sites</strong></del></span> <span 
class="inserted"><ins><em>users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>users is not enough to
+    legitimize actions like this.  At</em></ins></span> this <span 
class="removed"><del><strong>way, because</strong></del></span> <span 
class="inserted"><ins><em>point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out 
what</em></ins></span>
+    they <span class="removed"><del><strong>pass</strong></del></span> <span 
class="inserted"><ins><em>are &ldquo;consenting&rdquo; to.  Google should 
clearly and
+    honestly identify the information it collects on users, instead of
+    hiding</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
     and other companies from getting this personal information in the
@@ -1105,251 +1284,235 @@
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
+
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareOnTheRoad"&gt;Spyware 
on The Road&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201912190"&gt;
     &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>Google
-    removed the problematic extensions from their stores, but this shows
-    once more how unsafe nonfree software can be. Tools that</em></ins></span> 
are <span class="removed"><del><strong>starting</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span>
-    to <span class="removed"><del><strong>realize that</strong></del></span> 
<span class="inserted"><ins><em>protect a proprietary system are, instead, 
infecting</em></ins></span> it <span class="removed"><del><strong>is 
nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>with
-    additional malware (the system itself being</em></ins></span> the <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
+    for Firefox and Chrome were found to</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>problematic extensions from their stores, but 
this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting</em></ins></span> 
it <span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>with
+    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The 
result</em></ins></span> is
-    <span class="inserted"><ins><em>often</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span> <span 
class="inserted"><ins><em>legal threat demanding a lot of money.&lt;/p&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="inserted"><ins><em>nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+    makes</em></ins></span> it <span class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether</em></ins></span> the user has
-    <span class="removed"><del><strong>installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>Covid-19</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    estimates whether the user has Covid-19</em></ins></span> and &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+  &lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
     surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that</em></ins></span> is 
<span class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>a good
-    reason</em></ins></span> to <span class="inserted"><ins><em>use free 
software instead.&lt;/p&gt;
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
+    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;free&rdquo;</em></ins></span> in
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span>
     the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>sense</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on</em></ins></span> the <span class="removed"><del><strong>app 
developers get
-      users</strong></del></span> <span class="inserted"><ins><em>device.  
Many employers demand</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>do this.  For the
-    employee, this</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if</em></ins></span> they 
<span class="removed"><del><strong>report even which page</strong></del></span> 
<span class="inserted"><ins><em>install their own
+    software on</em></ins></span> the <span class="removed"><del><strong>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
     and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Chinese Communist 
Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
+    the <span class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>Great Nation&rdquo; app requires 
users</em></ins></span> to <span class="removed"><del><strong>Adobe&lt;/a&gt;.  
Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>grant it 
&lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>contain a
-    back-door allowing developers</em></ins></span> to <span 
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span 
class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="removed"><del><strong>developer</strong></del></span> 
<span class="inserted"><ins><em>is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly 
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
-      ask about sending it to other companies.  This 
shows</strong></del></span>
-    <span class="inserted"><ins><em>readable after copy-pasting in a text 
editor) includes a clarification
-    saying that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android 
version</em></ins></span>
-    of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    access</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
+    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed on</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Android version
+    of</em></ins></span> the <span class="removed"><del><strong>time; it is 
possible</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according</em></ins></span> to <span class="removed"><del><strong>physically 
remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks</em></ins></span> users <span class="removed"><del><strong>identify 
themselves and then sends personal data about</strong></del></span> <span 
class="inserted"><ins><em>even when it is turned off&lt;/a&gt;, after 
tricking</em></ins></span> them
-    <span class="inserted"><ins><em>into giving the app broad permissions in 
order</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>use one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
+    tracks users even when it</em></ins></span> is <span 
class="removed"><del><strong>made available</strong></del></span> <span 
class="inserted"><ins><em>turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>use one of its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. &lt;a
+    program</em></ins></span> is <span class="removed"><del><strong>not
+      really</strong></del></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="removed"><del><strong>proprietary</strong></del></span> surveillance. 
<span class="removed"><del><strong>These systems are an
+      intolerable invasion</strong></del></span>  <span 
class="inserted"><ins><em>There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage to spy through it 
too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
+    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>list</em></ins></span> of <span 
class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or 
more</em></ins></span> people <span 
class="removed"><del><strong>use</strong></del></span>
-    <span class="inserted"><ins><em>who have installed</em></ins></span> 
it&lt;/a&gt;.&lt;/p&gt;
-
-       <span class="removed"><del><strong>&lt;p&gt;The company's statement 
that it anonymizes the data may</strong></del></span>
-
-    <span class="inserted"><ins><em>&lt;p&gt;With a free program there would 
not</em></ins></span> be
-        <span class="removed"><del><strong>true, but it doesn't really matter. 
If it sells</strong></del></span> <span class="inserted"><ins><em>a list of who 
has installed
+    &lt;p&gt;With a free program there would not</em></ins></span> be <span 
class="removed"><del><strong>replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>a list of who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1357,33 +1520,31 @@
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
     bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>gather as much private</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>as
+    of</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>operating system,</em></ins></span> in <span 
class="inserted"><ins><em>order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;
-  &lt;/li&gt;
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps</em></ins></span> can <span 
class="removed"><del><strong>figure out who</strong></del></span> <span 
class="inserted"><ins><em>track
-    users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span> <span 
class="inserted"><ins><em>says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>allow 
them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201905300"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Femm 
&ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>reports the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it</strong></del></span> is <span 
class="removed"><del><strong>surrounded</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
+  &lt;li id="M201905300"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool for propaganda&lt;/a&gt;</em></ins></span> by <span 
class="inserted"><ins><em>natalist Christians.  It spreads distrust
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
@@ -1391,227 +1552,243 @@
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), and the vibration frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
     requirement to run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>event.&lt;/p&gt;
+    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
 
-    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span> can <span 
class="removed"><del><strong>check</strong></del></span> <span 
class="inserted"><ins><em>snoop on a lot of
-    sensitive data, including user's location and contact 
list,</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>has &lt;a
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's</em></ins></span> location <span 
class="removed"><del><strong>at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+    data <span class="inserted"><ins><em>is 
&ldquo;anonymized</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>aggregated,&rdquo;</em></ins></span> it <span 
class="removed"><del><strong>over, the state</strong></del></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>do so. A
-    free-software app that does more or less the same thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>spy 
on</strong></del></span> <span class="inserted"><ins><em>equal employment
+    and freedom to make</em></ins></span> their <span 
class="removed"><del><strong>renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>do so. A
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>you 
is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>new 
one</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>being 
developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>does more</em></ins></span> or less <span 
class="removed"><del><strong>all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>the same thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>Android phones and 
iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the phone has</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;Nonfree software in the phone</em></ins></span> has <span 
class="removed"><del><strong>got better.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>location data to 
Google.&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
+    the location</em></ins></span> data <span class="removed"><del><strong>are 
totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>Parliament
-  this way, because they</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>huge number of &lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or</em></ins></span> pass it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access to
-    the network but no direct access to the data. This 
results</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>massive
-    surveillance on which the user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on to user-installed 
apps</em></ins></span> that <span class="removed"><del><strong>TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>have 
access</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span>
+    the <span class="removed"><del><strong>user watches 
&mdash;</strong></del></span> <span class="inserted"><ins><em>network 
but</em></ins></span> no <span 
class="removed"><del><strong>exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>direct 
access to the data. This results</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>massive
+    surveillance</em></ins></span> on 
+      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>which the user has 
absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against 
people</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>poor
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>buried in
-    lengthy terms of service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>possible to turn this off, but 
having</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>buried in
+    lengthy terms of service that</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span 
class="inserted"><ins><em>difficult</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>understand. In any 
case,
+    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by</strong></del></span> <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>malware running on other devices in
+      range so as</strong></del></span>
+    <span class="inserted"><ins><em>library for building mobile apps, which 
also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
-  &lt;/li&gt;
+    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing</em></ins></span> that 
<span class="inserted"><ins><em>all the personal
+    data</em></ins></span> they <span class="removed"><del><strong>are nearby. 
 Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>collected 
would go to Facebook as well.&lt;/p&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It shows that no one</em></ins></span> can
+      <span class="removed"><del><strong>correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span> <span 
class="inserted"><ins><em>trust</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    misuse</em></ins></span> users' <span class="removed"><del><strong>voice 
on</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>would then have to
+      give it to</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span class="removed"><del><strong>US 
or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done</strong></del></span> 
<span class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>free software</strong></del></span> <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
+    and, once informed, was</em></ins></span> in
+      <span class="removed"><del><strong>&lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
+      the switch to turn this off has</strong></del></span> no <span 
class="removed"><del><strong>effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>hurry to take action. This proves</em></ins></span>
+    that the
+      <span class="removed"><del><strong>transmission 
reports</strong></del></span> <span class="inserted"><ins><em>policies 
of</em></ins></span> a <span class="removed"><del><strong>404 error really 
means nothing;</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps</em></ins></span> 
that <span class="removed"><del><strong>data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>used to
+    be</em></ins></span> on <span class="removed"><del><strong>the user's 
local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it</strong></del></span> <span 
class="inserted"><ins><em>Google Play</em></ins></span> had <span 
class="removed"><del><strong>installed a patch to stop this, but any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop</strong></del></span> <span 
class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>the 
+      internet&lt;/a&gt;&mdash; even what</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole</em></ins></span> their 
<span class="removed"><del><strong>users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a</strong></del></span> <span class="inserted"><ins><em>credentials. 
Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    haven't yet, but they should also stay away from</em></ins></span> nonfree 
<span class="removed"><del><strong>operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect</strong></del></span> <span class="inserted"><ins><em>apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>wide range</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier,</strong></del></span> <span 
class="inserted"><ins><em>knowing what</em></ins></span> they <span 
class="inserted"><ins><em>really do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
@@ -2639,83 +2816,51 @@
     the devices are tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon has a very precise picture of users' life
     at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;</em></ins></span>
+    in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the Alexa service staff even has 
access</em></ins></span> to <span class="removed"><del><strong>Adobe&lt;/a&gt;. 
 Adobe's &ldquo;excuse&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where</em></ins></span> it's
-      <span class="removed"><del><strong>needed</strong></del></span> <span 
class="inserted"><ins><em>done&rdquo;), users have no way</em></ins></span>
-    to <span class="removed"><del><strong>check DRM!&lt;/p&gt;
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>know what happens to 
the recordings unless human eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>user is still
-    paying</em></ins></span> for
-    <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>the 
subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may</em></ins></span> be 
<span class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>cheaper in some
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be</em></ins></span> in
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+    restrictions in the use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
-    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even</strong></del></span> <span class="inserted"><ins><em>into a 
listening device&lt;/a&gt; for them.&lt;/p&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And</em></ins></span> if <span 
class="removed"><del><strong>no one connects</strong></del></span> <span 
class="inserted"><ins><em>some government such as China or the US
-    told Amazon to do this, or cease</em></ins></span> to <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>moral 
fiber to say no?&lt;/p&gt;
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
@@ -2726,38 +2871,30 @@
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
     offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>car's movements</strong></del></span> <span 
class="inserted"><ins><em>house,</em></ins></span> all the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if</em></ins></span> it is <span 
class="removed"><del><strong>possible to physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data</em></ins></span> about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2774,7 +2911,7 @@
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect</em></ins></span> of <span 
class="inserted"><ins><em>what they do.&lt;/p&gt;
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2783,108 +2920,68 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009100"&gt;
-    &lt;p&gt;Internet-enabled watches with</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span>
-    are <span class="removed"><del><strong>an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>malware, violating people (specially children's)
-    privacy. In addition, they have a lot</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>security flaws. They &lt;a
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to and 
from</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>watch, possibly endangering</em></ins></span> 
the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;</em></ins></span>
-    to <span class="removed"><del><strong>extract data remotely and
-      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>mean 
&ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The 
company</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article</em></ins></span> says <span 
class="removed"><del><strong>it doesn't
-      store</strong></del></span> this <span 
class="removed"><del><strong>information,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>if the state orders it to get the data
-      and hand it over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that could 
be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+  &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>report its location</em></ins></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
     &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>AWS to help create custom insurance premiums&lt;/a&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
     &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
-    disconnect its cellular antenna</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>its GPS antenna.  
If</em></ins></span> you <span class="removed"><del><strong>on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>want
+    disconnect its cellular antenna and its GPS antenna.  If you want
     GPS navigation, get a separate navigator which runs free software
     and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
     record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible,</em></ins></span> as 
<span class="inserted"><ins><em>it involves
+    the user, access to the data is nearly impossible, as it involves
     cracking the car's computer, which is always hidden and running with
     proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>personal data, and &lt;a
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
-      consent before collecting</strong></del></span> <span 
class="inserted"><ins><em>a junkyard the driver's</em></ins></span> personal 
data <span class="removed"><del><strong>are totally inadequate.
-      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>goes with
+    when they go to a junkyard the driver's personal data goes with
     them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2892,193 +2989,117 @@
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford</em></ins></span> a 
<span class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>lot of data,
+    connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in 
breaking</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by 
disconnecting</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>cellular modem, or 
wrapping</em></ins></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>antenna in aluminum 
foil?&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201811300"&gt;
+  &lt;li id="M201811300"&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>terminal</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    cars to be equipped with a terminal that &lt;a
     href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,</em></ins></span>
-    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In practice, 
&lt;a
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; as part of their own spying, then
-    forward</em></ins></span> it <span class="removed"><del><strong>enabled by 
default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> to the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810230"&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>company 
already
-      monitors. Tivo customers are unaware they're being 
watched</strong></del></span> <span class="inserted"><ins><em>choices of radio 
programs&lt;/a&gt; in its
-    &ldquo;connected&rdquo; cars, minute</em></ins></span> by
-      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance</strong></del></span> <span 
class="inserted"><ins><em>minute.&lt;/p&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could have got that 
easily</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
-    <span class="inserted"><ins><em>sneaking it into the contract that users 
sign for some digital service
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be
-      <span class="removed"><del><strong>picked up by proprietary malware 
running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you really want</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>data, or that 
the software
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps</em></ins></span> can
-      <span class="removed"><del><strong>correlate ads with Web activity, and
-      other</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree 
software</em></ins></span> are <span 
class="removed"><del><strong>watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
     
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
+  &lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    cell phone modem which allows effectively anyone to &lt;a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>system 
has no authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it <span 
class="removed"><del><strong>and would then have to
-      give</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't be confident that Nissan
+    &lt;p&gt;That's easy to</em></ins></span> do <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>because the system has no authentication
+    when accessed</em></ins></span> through <span 
class="removed"><del><strong>ad networks</strong></del></span> <span 
class="inserted"><ins><em>the modem.  However, even if it asked
+    for authentication, you couldn't be confident</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>Nissan
     has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which 
means</em></ins></span>
-    it <span class="inserted"><ins><em>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="inserted"><ins><em>company to extract</em></ins></span>
+    data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
+      companies.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless</strong></del></span> <span 
class="inserted"><ins><em>track the car's movements all the 
time;</em></ins></span>
-    it is <span class="removed"><del><strong>done
-    by free software in your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>possible to physically remove the cell phone 
modem, though.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>company to extract
-    data remotely</em></ins></span> and <span 
class="inserted"><ins><em>determine</em></ins></span> the <span 
class="removed"><del><strong>switch to turn</strong></del></span> <span 
class="inserted"><ins><em>car's location
+      &lt;p&gt;They use</strong></del></span> <span 
class="inserted"><ins><em>determine the car's location
     at any time. (See Section 2, paragraphs b and c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>off has no 
effect.  (The fact that</strong></del></span>
-    <span class="inserted"><ins><em>information, but if</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>state orders it to get</em></ins></span> the <span 
class="removed"><del><strong>server
-      could save that</strong></del></span> data <span 
class="removed"><del><strong>anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>and hand</em></ins></span> it
-      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span>
-    <span class="inserted"><ins><em>over,</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>state can store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>data to 
manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>information, but if the state orders 
it</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>get the 
data</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
     records information about drivers' movements&lt;/a&gt;, which is made
-    available</em></ins></span> to <span class="removed"><del><strong>stop 
this, but any product
-      could spy</strong></del></span> <span class="inserted"><ins><em>car 
manufacturers, insurance companies, and others.&lt;/p&gt;
+    available</em></ins></span> to <span class="removed"><del><strong>spend a 
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers, 
insurance companies, and others.&lt;/p&gt;
 
-    &lt;p&gt;The case of toll-collection systems, mentioned 
in</em></ins></span> this <span class="removed"><del><strong>way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> <span class="inserted"><ins><em>article,
-    is not really a matter</em></ins></span> of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>proprietary surveillance. These systems
-    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>should be replaced with
+    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door</strong></del></span> <span class="inserted"><ins><em>matter of 
proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
     anonymous payment systems, but the invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;</em></ins></span>
+    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report to the 
-      internet&lt;/a&gt;&mdash; even what their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data about their</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require</em></ins></span>
-    users <span class="removed"><del><strong>and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-      collected by various cr&hellip;apps and sites made by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
to <span class="removed"><del><strong>buy things, and hunt 
-      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
-      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3499,7 +3520,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/02 17:32:41 $
+$Date: 2020/11/10 17:37:43 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.345
retrieving revision 1.346
diff -u -b -r1.345 -r1.346
--- proprietary/po/proprietary-surveillance.ja.po       2 Nov 2020 17:32:41 
-0000       1.345
+++ proprietary/po/proprietary-surveillance.ja.po       10 Nov 2020 17:37:44 
-0000      1.346
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -114,7 +114,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "「どうやって、わたしが犬だとわかったんだろう?」"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -123,7 +123,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary/po/proprietary-surveillance.pot 2 Nov 2020 17:32:41 -0000       
1.284
+++ proprietary/po/proprietary-surveillance.pot 10 Nov 2020 17:37:44 -0000      
1.285
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -82,7 +82,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -91,7 +91,7 @@
 "whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary/po/proprietary-surveillance.ru-en.html  2 Nov 2020 18:03:09 
-0000       1.229
+++ proprietary/po/proprietary-surveillance.ru-en.html  10 Nov 2020 17:37:44 
-0000      1.230
@@ -75,7 +75,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A common malicious functionality is to snoop on the user.  This page
 records <strong>clearly established cases of proprietary software that
 spies on or tracks users</strong>.  Manufacturers even refuse
@@ -87,7 +87,7 @@
 have their own page: <a
 href="/proprietary/proprietary-tethers.html#about-page">Proprietary
 Tethers</a>.</p>
-</div>
+</blockquote>
 
 <div class="important" style="clear: both">
 <p>If you know of an example that ought to be in this page but isn't
@@ -2771,7 +2771,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.642
retrieving revision 1.643
diff -u -b -r1.642 -r1.643
--- proprietary/po/proprietary-surveillance.ru.po       2 Nov 2020 18:03:09 
-0000       1.642
+++ proprietary/po/proprietary-surveillance.ru.po       10 Nov 2020 17:37:44 
-0000      1.643
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -94,7 +94,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Откуда они узнали, что я 
собака?&rdquo;"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -109,7 +109,7 @@
 "techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
 "\">говорить, шпионят ли они за 
пользователями в пользу государства</a>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "

Index: proprietary/po/proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-tethers.de-diff.html     17 Oct 2020 08:05:10 
-0000      1.31
+++ proprietary/po/proprietary-tethers.de-diff.html     10 Nov 2020 17:37:44 
-0000      1.32
@@ -67,7 +67,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;Tethering a product or program <span class="inserted"><ins><em>means 
designing it</em></ins></span> to <span class="inserted"><ins><em>work only by
 communicating with</em></ins></span> a specific <span 
class="removed"><del><strong>server</strong></del></span> <span 
class="inserted"><ins><em>server.  That</em></ins></span> is <span 
class="inserted"><ins><em>always</em></ins></span> an injustice
 <span class="inserted"><ins><em>since it means you can't use the program 
without that server.  It is
@@ -77,7 +77,7 @@
 &lt;p&gt;In some cases, tethering is used to do specific nasty things to the
 users.</em></ins></span>  This page reports instances where tethering was used 
to harm
 the users directly.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -167,12 +167,10 @@
     to Tesco's server for reinstalling default settings.  Tesco &lt;a
     
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix"&gt;
     turned off the server for old models&lt;/a&gt;, so now if you try to
-    reinstall the default settings, it bricks them 
instead.&lt;/p&gt;</em></ins></span>
+    reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
+  &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
     all the nasty characteristics of such devices: &lt;a
@@ -183,10 +181,12 @@
 
     &lt;p&gt;In addition, setting the desired temperature requires running
     nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
+    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807050"&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807050"&gt;</em></ins></span>
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
     
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
@@ -399,7 +399,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/10 17:37:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-tethers.de.po    17 Oct 2020 08:05:10 -0000      
1.43
+++ proprietary/po/proprietary-tethers.de.po    10 Nov 2020 17:37:44 -0000      
1.44
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -128,7 +128,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | [-Tethering a product or program-]{+In some cases, tethering is used+} to
 # | [-a-] {+do+} specific [-server is an injustice in itself.-] {+nasty things
 # | to the users.+}  This page reports instances where tethering was used to

Index: proprietary/po/proprietary-tethers.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-tethers.es-en.html       19 Oct 2020 09:00:51 
-0000      1.10
+++ proprietary/po/proprietary-tethers.es-en.html       10 Nov 2020 17:37:44 
-0000      1.11
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Tethering a product or program means designing it to work only by
 communicating with a specific server.  That is always an injustice
 since it means you can't use the program without that server.  It is
@@ -63,7 +63,7 @@
 <p>In some cases, tethering is used to do specific nasty things to the
 users.  This page reports instances where tethering was used to harm
 the users directly.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -348,7 +348,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 09:00:51 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-tethers.es.po    19 Oct 2020 08:54:59 -0000      
1.24
+++ proprietary/po/proprietary-tethers.es.po    10 Nov 2020 17:37:44 -0000      
1.25
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-19 10:53+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -83,7 +83,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -96,7 +96,7 @@
 "programa sin ese servidor. Se produce también una injusticia secundaria si "
 "no es posible comunicarse con el servidor de otra manera."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "

Index: proprietary/po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-tethers.fr-en.html       17 Oct 2020 08:59:36 
-0000      1.40
+++ proprietary/po/proprietary-tethers.fr-en.html       10 Nov 2020 17:37:44 
-0000      1.41
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Tethering a product or program means designing it to work only by
 communicating with a specific server.  That is always an injustice
 since it means you can't use the program without that server.  It is
@@ -63,7 +63,7 @@
 <p>In some cases, tethering is used to do specific nasty things to the
 users.  This page reports instances where tethering was used to harm
 the users directly.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -348,7 +348,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/po/proprietary-tethers.fr.po    17 Oct 2020 08:29:20 -0000      
1.81
+++ proprietary/po/proprietary-tethers.fr.po    10 Nov 2020 17:37:44 -0000      
1.82
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -89,7 +89,7 @@
 "également une injustice secondaire si on ne peut pas communiquer avec le "
 "serveur d'une autre manière."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "

Index: proprietary/po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/proprietary-tethers.ja-diff.html     17 Oct 2020 08:05:10 
-0000      1.51
+++ proprietary/po/proprietary-tethers.ja-diff.html     10 Nov 2020 17:37:44 
-0000      1.52
@@ -68,7 +68,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+&lt;blockquote&gt;
 &lt;p&gt;Tethering a product or program means designing it to work only by
 communicating with a specific server.  That is always an injustice
 since it means you can't use the program without that server.  It is
@@ -78,7 +78,7 @@
 &lt;p&gt;In some cases, tethering is used to do specific nasty things to the
 users.  This page reports instances where tethering was used to harm
 the users directly.&lt;/p&gt;
-&lt;/div&gt;
+&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -389,7 +389,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/10 17:37:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-tethers.ja.po    17 Oct 2020 08:05:10 -0000      
1.42
+++ proprietary/po/proprietary-tethers.ja.po    10 Nov 2020 17:37:44 -0000      
1.43
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -108,7 +108,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "

Index: proprietary/po/proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-tethers.pot      17 Oct 2020 08:05:10 -0000      
1.39
+++ proprietary/po/proprietary-tethers.pot      10 Nov 2020 17:37:44 -0000      
1.40
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -76,7 +76,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "

Index: proprietary/po/proprietary-tethers.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-tethers.pt-br-diff.html  17 Oct 2020 08:05:10 
-0000      1.2
+++ proprietary/po/proprietary-tethers.pt-br-diff.html  10 Nov 2020 17:37:44 
-0000      1.3
@@ -65,7 +65,8 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;
+<span class="removed"><del><strong>&lt;div 
class="italic"&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;Tethering a product or program means designing it to work only by
 communicating with a specific server.  That is always an injustice
 since it means you can't use the program without that server.  It is
@@ -75,7 +76,8 @@
 &lt;p&gt;In some cases, tethering is used to do specific nasty things to the
 users.  This page reports instances where tethering was used to harm
 the users directly.&lt;/p&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/blockquote&gt;</em></ins></span>
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -361,7 +363,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/10 17:37:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-tethers.pt-br.po 17 Oct 2020 08:05:10 -0000      
1.34
+++ proprietary/po/proprietary-tethers.pt-br.po 10 Nov 2020 17:37:44 -0000      
1.35
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-06-30 08:28-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -78,7 +78,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -91,7 +91,7 @@
 "servidor. Também é uma injustiça secundária se você não puder se 
comunicar "
 "com o servidor de outra maneira."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "

Index: proprietary/po/proprietary-tethers.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-tethers.ru-en.html       19 Oct 2020 10:00:05 
-0000      1.39
+++ proprietary/po/proprietary-tethers.ru-en.html       10 Nov 2020 17:37:44 
-0000      1.40
@@ -53,7 +53,7 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>Tethering a product or program means designing it to work only by
 communicating with a specific server.  That is always an injustice
 since it means you can't use the program without that server.  It is
@@ -63,7 +63,7 @@
 <p>In some cases, tethering is used to do specific nasty things to the
 users.  This page reports instances where tethering was used to harm
 the users directly.</p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -348,7 +348,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary/po/proprietary-tethers.ru.po    19 Oct 2020 10:00:05 -0000      
1.86
+++ proprietary/po/proprietary-tethers.ru.po    10 Nov 2020 17:37:44 -0000      
1.87
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -92,7 +92,7 @@
 "программой без этого сервера. Если вы не 
можете связываться с этим сервером "
 "по-другому, то это тоже несправедливо."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "

Index: proprietary/po/proprietary-tyrants.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-tyrants.de-diff.html     24 Jun 2020 05:37:13 
-0000      1.21
+++ proprietary/po/proprietary-tyrants.de-diff.html     10 Nov 2020 17:37:44 
-0000      1.22
@@ -66,14 +66,14 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;A &lt;em&gt;tyrant&lt;/em&gt; <span 
class="removed"><del><strong>device</strong></del></span> is <span 
class="removed"><del><strong>one</strong></del></span> <span 
class="inserted"><ins><em>a malicious device</em></ins></span> that refuses to 
allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
 other than the &ldquo;approved&rdquo; system versions.  We also
 refer to this practice as &lt;em&gt;tivoization&lt;/em&gt;.
 &lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;</em></ins></span>
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -257,7 +257,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tyrants.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.de.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-tyrants.de.po    24 Jun 2020 05:37:13 -0000      
1.47
+++ proprietary/po/proprietary-tyrants.de.po    10 Nov 2020 17:37:44 -0000      
1.48
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -123,7 +123,7 @@
 msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
 
 # 'tyrant' als 'tyrannical' übersetzt -> liest sich flüssiger
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
 # | refuses to allow users to install a different operating system or a
 # | modified operating system.  These devices have measures to block execution

Index: proprietary/po/proprietary-tyrants.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.es-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-tyrants.es-en.html       24 Jun 2020 05:37:13 
-0000      1.25
+++ proprietary/po/proprietary-tyrants.es-en.html       10 Nov 2020 17:37:44 
-0000      1.26
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A <em>tyrant</em> is a malicious device that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
 other than the &ldquo;approved&rdquo; system versions.  We also
 refer to this practice as <em>tivoization</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.es.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-tyrants.es.po    24 Jun 2020 05:37:13 -0000      
1.53
+++ proprietary/po/proprietary-tyrants.es.po    10 Nov 2020 17:37:44 -0000      
1.54
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-02-07 13:10+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
 msgstr ""
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-tyrants.fr-en.html       24 Jun 2020 05:37:13 
-0000      1.28
+++ proprietary/po/proprietary-tyrants.fr-en.html       10 Nov 2020 17:37:44 
-0000      1.29
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A <em>tyrant</em> is a malicious device that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
 other than the &ldquo;approved&rdquo; system versions.  We also
 refer to this practice as <em>tivoization</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-tyrants.fr.po    5 Oct 2020 13:13:25 -0000       
1.48
+++ proprietary/po/proprietary-tyrants.fr.po    10 Nov 2020 17:37:44 -0000      
1.49
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-02-07 10:01+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/proprietary-tyrants.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-tyrants.it-diff.html     24 Jun 2020 05:37:13 
-0000      1.28
+++ proprietary/po/proprietary-tyrants.it-diff.html     10 Nov 2020 17:37:44 
-0000      1.29
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;A &lt;em&gt;tyrant&lt;/em&gt; <span 
class="removed"><del><strong>device</strong></del></span> is <span 
class="removed"><del><strong>one</strong></del></span> <span 
class="inserted"><ins><em>a malicious device</em></ins></span> that refuses to 
allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
@@ -77,7 +77,7 @@
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;
 &lt;p&gt;Some LG TVs</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -258,7 +258,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-tyrants.it.po    24 Jun 2020 05:37:13 -0000      
1.44
+++ proprietary/po/proprietary-tyrants.it.po    10 Nov 2020 17:37:44 -0000      
1.45
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-04-02 12:25+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 # | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
 # | refuses to allow users to install a different operating system or a
 # | modified operating system.  These devices have measures to block execution

Index: proprietary/po/proprietary-tyrants.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-tyrants.ja-diff.html     31 Jul 2020 03:03:45 
-0000      1.30
+++ proprietary/po/proprietary-tyrants.ja-diff.html     10 Nov 2020 17:37:44 
-0000      1.31
@@ -66,7 +66,7 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;div class="italic"&gt;</em></ins></span>
+&lt;blockquote&gt;</em></ins></span>
 &lt;p&gt;A &lt;em&gt;tyrant&lt;/em&gt; <span 
class="removed"><del><strong>device</strong></del></span> is <span 
class="removed"><del><strong>one</strong></del></span> <span 
class="inserted"><ins><em>a malicious device</em></ins></span> that refuses to 
allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
@@ -77,7 +77,7 @@
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;
 &lt;p&gt;Some LG TVs</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -258,7 +258,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/07/31 03:03:45 $
+$Date: 2020/11/10 17:37:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tyrants.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ja.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-tyrants.ja.po    24 Jun 2020 05:37:13 -0000      
1.47
+++ proprietary/po/proprietary-tyrants.ja.po    10 Nov 2020 17:37:44 -0000      
1.48
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:09+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "これは典型的に悪意ある機能の形を取ります。"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "A <em>tyrant</em> device is one that refuses to allow users to install a "

Index: proprietary/po/proprietary-tyrants.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.pot,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-tyrants.pot      24 Jun 2020 05:37:13 -0000      
1.24
+++ proprietary/po/proprietary-tyrants.pot      10 Nov 2020 17:37:44 -0000      
1.25
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/proprietary-tyrants.pt-br-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.pt-br-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-tyrants.pt-br-en.html    24 Jun 2020 05:37:13 
-0000      1.5
+++ proprietary/po/proprietary-tyrants.pt-br-en.html    10 Nov 2020 17:37:44 
-0000      1.6
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A <em>tyrant</em> is a malicious device that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
 other than the &ldquo;approved&rdquo; system versions.  We also
 refer to this practice as <em>tivoization</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.pt-br.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-tyrants.pt-br.po 24 Jun 2020 05:02:40 -0000      
1.13
+++ proprietary/po/proprietary-tyrants.pt-br.po 10 Nov 2020 17:37:44 -0000      
1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-02-06 21:14-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -77,7 +77,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/proprietary-tyrants.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-tyrants.ru-en.html       24 Jun 2020 05:37:13 
-0000      1.28
+++ proprietary/po/proprietary-tyrants.ru-en.html       10 Nov 2020 17:37:44 
-0000      1.29
@@ -52,14 +52,14 @@
 </div>
 
 <div class="article">
-<div class="italic">
+<blockquote>
 <p>A <em>tyrant</em> is a malicious device that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
 other than the &ldquo;approved&rdquo; system versions.  We also
 refer to this practice as <em>tivoization</em>.
 </p>
-</div>
+</blockquote>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-tyrants.ru.po    24 Jun 2020 05:04:03 -0000      
1.70
+++ proprietary/po/proprietary-tyrants.ru.po    10 Nov 2020 17:37:44 -0000      
1.71
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 14:10+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
 msgid "This typically takes the form of malicious functionalities."
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- proprietary/po/pt-br.po     10 Nov 2020 16:02:03 -0000      1.294
+++ proprietary/po/pt-br.po     10 Nov 2020 17:37:44 -0000      1.295
@@ -3519,7 +3519,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -5329,14 +5329,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -6891,7 +6891,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -7100,7 +7100,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -7235,7 +7235,7 @@
 msgid "Proprietary Addictions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -7631,7 +7631,7 @@
 msgid "Proprietary Back Doors"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -7913,7 +7913,7 @@
 msgid "Proprietary Censorship"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -7922,7 +7922,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -7969,7 +7969,7 @@
 msgid "Proprietary Coverups"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -7994,7 +7994,7 @@
 msgid "Proprietary Deception"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -8080,7 +8080,7 @@
 msgid "Proprietary DRM"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -8088,7 +8088,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -8169,7 +8169,7 @@
 msgid "Proprietary Fraud"
 msgstr "Tiranos proprietários"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -8197,13 +8197,13 @@
 msgid "Proprietary Incompatibility"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -8211,7 +8211,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -8219,7 +8219,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -8227,7 +8227,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -8256,7 +8256,7 @@
 msgid "Proprietary Insecurity"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -8265,7 +8265,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -8374,7 +8374,7 @@
 msgid "Proprietary Interference"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -8433,7 +8433,7 @@
 msgid "Proprietary Jails"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -8441,14 +8441,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -8492,14 +8492,14 @@
 msgid "Proprietary Manipulation"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -8518,13 +8518,13 @@
 msgid "Proprietary Obsolescence"
 msgstr "Amarração proprietária"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -8532,7 +8532,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -8936,7 +8936,7 @@
 msgid "Proprietary Sabotage"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -9066,7 +9066,7 @@
 msgid "Proprietary Subscriptions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -9076,7 +9076,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -9106,7 +9106,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -9115,7 +9115,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -9895,7 +9895,7 @@
 msgid "Proprietary Tethers"
 msgstr "Amarração proprietária"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -9908,7 +9908,7 @@
 "servidor. Também é uma injustiça secundária se você não puder se 
comunicar "
 "com o servidor de outra maneira."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "Tethering a product or program to a specific server is an injustice in "
@@ -9933,7 +9933,7 @@
 msgid "Proprietary Tyrants"
 msgstr "Tiranos proprietários"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "A <em>tyrant</em> device is one that refuses to allow users to install a "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.503
retrieving revision 1.504
diff -u -b -r1.503 -r1.504
--- proprietary/po/ru.po        10 Nov 2020 16:02:04 -0000      1.503
+++ proprietary/po/ru.po        10 Nov 2020 17:37:44 -0000      1.504
@@ -4302,7 +4302,7 @@
 msgid "Malware in Games"
 msgstr "Вредоносные программы в играх"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -6613,7 +6613,7 @@
 msgid "Malware in Mobile Devices"
 msgstr "Вредоносные программы в мобильных 
устройствах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
@@ -6623,7 +6623,7 @@
 "пользователям: отслеживают их 
перемещения и прослушивают их переговоры. 
Вот "
 "почему мы называем их &ldquo;мечтой 
Сталина&rdquo;."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -8538,7 +8538,7 @@
 msgid "Malware in Webpages"
 msgstr "Вредоносные программы на страницах 
сайтов"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -8797,7 +8797,7 @@
 msgid "Potential Malware"
 msgstr "Потенциальные вредоносные программы"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -8951,7 +8951,7 @@
 msgid "Proprietary Addictions"
 msgstr "Зависимость от несвободных программ"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -9305,7 +9305,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Лазейки в несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -9635,7 +9635,7 @@
 msgid "Proprietary Censorship"
 msgstr "Цензура в несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -9649,7 +9649,7 @@
 "которые подвергают цензуре установку</a> 
прикладных программ (мы называем "
 "это &ldquo;тюрьмами&rdquo;)."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -9705,7 +9705,7 @@
 msgid "Proprietary Coverups"
 msgstr "Утайки в несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -9737,7 +9737,7 @@
 msgid "Proprietary Deception"
 msgstr "Обман в несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -9831,7 +9831,7 @@
 msgid "Proprietary DRM"
 msgstr "Цифровое управление ограничениями в 
несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -9843,7 +9843,7 @@
 "ограничения того, что могут делать 
пользователи. Эти функции называются "
 "также <em>цифровыми наручниками</em>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -9962,7 +9962,7 @@
 msgid "Proprietary Fraud"
 msgstr "Мошенничество в несвободных 
программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -9992,7 +9992,7 @@
 msgid "Proprietary Incompatibility"
 msgstr "Несовместимость несвободных программ"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
@@ -10001,7 +10001,7 @@
 "программы с программами третьих сторон, 
которые работают с теми же типами "
 "данных."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -10014,7 +10014,7 @@
 "свободные программы, которые могут 
освободить устройство, на котором "
 "работают."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -10026,7 +10026,7 @@
 "данных станет весьма затруднительным, 
если поддержка несвободных программ, "
 "которые могут их читать, прекратится."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -10038,7 +10038,7 @@
 "затрудняется или замедляется, что ее 
можно провести только над небольшим "
 "количеством данных."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -10066,7 +10066,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Уязвимость несвободных программ"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -10081,7 +10081,7 @@
 "сообщаем о них, чтобы показать, что 
несвободные программы не исключают "
 "ошибки, и часто весьма грубые."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -10231,7 +10231,7 @@
 msgid "Proprietary Interference"
 msgstr "Помехи от несвободных программ"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -10306,7 +10306,7 @@
 msgid "Proprietary Jails"
 msgstr "Несвободные системы-тюрьмы"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -10318,7 +10318,7 @@
 "может устанавливать пользователь. <a 
href=\"http://i.imgur.com/ZRViDum.jpg";
 "\">Изображение ай-тюрьмы</a> иллюстрирует 
эту проблему."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
@@ -10328,7 +10328,7 @@
 "владеющей системой. Продажа продуктов, 
спроектированных как платформы для "
 "наложения компанией цензуры, должна быть 
запрещена законом."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -10375,7 +10375,7 @@
 msgid "Proprietary Manipulation"
 msgstr "Манипуляция в несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
@@ -10385,7 +10385,7 @@
 "Вот примеры программ, спроектированных, 
чтобы делать это, опираясь на "
 "человеческую психологию."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -10405,7 +10405,7 @@
 msgid "Proprietary Obsolescence"
 msgstr "Устаревание несвободных программ"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
@@ -10413,7 +10413,7 @@
 "Запрограммированное 
устаревание&nbsp;&mdash;одна из вредоносных 
функций, "
 "которые могут закладываться в 
несвободные программы."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -10427,7 +10427,7 @@
 "приходится выбрасывать неисправную 
аппаратуру, которую можно было бы "
 "починить."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -10826,7 +10826,7 @@
 msgid "Proprietary Sabotage"
 msgstr "Саботаж несвободных программ"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -10990,7 +10990,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "Работа несвободных программ по 
подписке"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -11005,7 +11005,7 @@
 "proprietary/proprietary-tethers.html#about-page\">привязана к 
серверу</a>, а "
 "сервер проверяет дату. И то, и другое 
является вредоносной функцией."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -11038,7 +11038,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Откуда они узнали, что я 
собака?&rdquo;"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -11053,7 +11053,7 @@
 "techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
 "\">говорить, шпионят ли они за 
пользователями в пользу государства</a>."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -11960,7 +11960,7 @@
 msgid "Proprietary Tethers"
 msgstr "Привязка в несвободных программах"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -11973,7 +11973,7 @@
 "программой без этого сервера. Если вы не 
можете связываться с этим сервером "
 "по-другому, то это тоже несправедливо."
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -11993,7 +11993,7 @@
 msgid "Proprietary Tyrants"
 msgstr "Несвободные системы-тираны"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/tr.po        10 Nov 2020 16:02:06 -0000      1.76
+++ proprietary/po/tr.po        10 Nov 2020 17:37:44 -0000      1.77
@@ -3111,7 +3111,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4747,14 +4747,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -6073,7 +6073,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6248,7 +6248,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -6352,7 +6352,7 @@
 msgid "Proprietary Addictions"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -6713,7 +6713,7 @@
 msgid "Proprietary Back Doors"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -6954,7 +6954,7 @@
 msgid "Proprietary Censorship"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -6963,7 +6963,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -7012,7 +7012,7 @@
 msgid "Proprietary Coverups"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -7039,7 +7039,7 @@
 msgid "Proprietary Deception"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -7103,7 +7103,7 @@
 msgid "Proprietary DRM"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -7111,7 +7111,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -7192,7 +7192,7 @@
 msgid "Proprietary Fraud"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -7218,13 +7218,13 @@
 msgid "Proprietary Incompatibility"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -7232,7 +7232,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -7240,7 +7240,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -7248,7 +7248,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7275,7 +7275,7 @@
 msgid "Proprietary Insecurity"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7284,7 +7284,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7391,7 +7391,7 @@
 msgid "Proprietary Interference"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -7454,7 +7454,7 @@
 msgid "Proprietary Jails"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -7462,14 +7462,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -7513,14 +7513,14 @@
 msgid "Proprietary Manipulation"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7539,13 +7539,13 @@
 msgid "Proprietary Obsolescence"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -7553,7 +7553,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -7947,7 +7947,7 @@
 msgid "Proprietary Sabotage"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -8073,7 +8073,7 @@
 msgid "Proprietary Subscriptions"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -8083,7 +8083,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -8115,7 +8115,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -8124,7 +8124,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -8871,7 +8871,7 @@
 msgid "Proprietary Tethers"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -8879,7 +8879,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -8898,7 +8898,7 @@
 msgid "Proprietary Tyrants"
 msgstr "Özel Mülk Bağımlılıklar"
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/zh-cn.po     10 Nov 2020 16:02:07 -0000      1.72
+++ proprietary/po/zh-cn.po     10 Nov 2020 17:37:44 -0000      1.73
@@ -3096,7 +3096,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4670,14 +4670,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -5970,7 +5970,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6149,7 +6149,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -6255,7 +6255,7 @@
 msgid "Proprietary Addictions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -6513,7 +6513,7 @@
 msgid "Proprietary Back Doors"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -6756,7 +6756,7 @@
 msgid "Proprietary Censorship"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -6765,7 +6765,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -6812,7 +6812,7 @@
 msgid "Proprietary Coverups"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -6837,7 +6837,7 @@
 msgid "Proprietary Deception"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -6899,7 +6899,7 @@
 msgid "Proprietary DRM"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6907,7 +6907,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6986,7 +6986,7 @@
 msgid "Proprietary Fraud"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -7010,13 +7010,13 @@
 msgid "Proprietary Incompatibility"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -7024,7 +7024,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -7032,7 +7032,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -7040,7 +7040,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7069,7 +7069,7 @@
 msgid "Proprietary Insecurity"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7078,7 +7078,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7187,7 +7187,7 @@
 msgid "Proprietary Interference"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -7244,7 +7244,7 @@
 msgid "Proprietary Jails"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -7252,14 +7252,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -7301,14 +7301,14 @@
 msgid "Proprietary Manipulation"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7325,13 +7325,13 @@
 msgid "Proprietary Obsolescence"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -7339,7 +7339,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -7711,7 +7711,7 @@
 msgid "Proprietary Sabotage"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -7834,7 +7834,7 @@
 msgid "Proprietary Subscriptions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -7844,7 +7844,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -7874,7 +7874,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -7883,7 +7883,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -8620,7 +8620,7 @@
 msgid "Proprietary Tethers"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -8628,7 +8628,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -8645,7 +8645,7 @@
 msgid "Proprietary Tyrants"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/zh-tw.po     10 Nov 2020 16:02:07 -0000      1.230
+++ proprietary/po/zh-tw.po     10 Nov 2020 17:37:44 -0000      1.231
@@ -3127,7 +3127,7 @@
 msgid "Malware in Games"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Among the numerous malicious functionalities that are found in games, <a "
 "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4668,14 +4668,14 @@
 msgid "Malware in Mobile Devices"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Nearly all mobile phones do two grievous wrongs to their users: tracking "
 "their movements, and listening to their conversations.  This is why we call "
 "them &ldquo;Stalin's dream&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The malware we list here is present in every phone, or in software that is "
 "not made by Apple or Google (including its subsidiaries).  Malicious "
@@ -5941,7 +5941,7 @@
 msgid "Malware in Webpages"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
 "spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6123,7 +6123,7 @@
 msgid "Potential Malware"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page describes malicious techniques that proprietary software might use "
 "in the future for malicious purposes.  We don't have any evidence that they "
@@ -6231,7 +6231,7 @@
 msgid "Proprietary Addictions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page deals with malicious functionalities that are added to some "
 "programs for the sole purpose of luring users into more and more frequent "
@@ -6489,7 +6489,7 @@
 msgid "Proprietary Back Doors"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities are mediated by <a href=\"/proprietary/"
 "proprietary.html#f1\">back doors</a>.  Here are examples of programs that "
@@ -6746,7 +6746,7 @@
 msgid "Proprietary Censorship"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
@@ -6755,7 +6755,7 @@
 "&ldquo;jails&rdquo;)."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Selling products designed as platforms for a company to impose censorship "
 "ought to be forbidden by law, but it isn't."
@@ -6804,7 +6804,7 @@
 msgid "Proprietary Coverups"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists instances where proprietary software had a bug, and the "
 "developers converted it into a malicious functionality by trying to cover up "
@@ -6831,7 +6831,7 @@
 msgid "Proprietary Deception"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Deception is a malicious functionality that makes the program dishonest or "
 "conceals trickery. Here are examples of such malicious functionalities. "
@@ -6894,7 +6894,7 @@
 msgid "Proprietary DRM"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs and systems that implement "
 "<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6902,7 +6902,7 @@
 "called <em>digital handcuffs</em>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6982,7 +6982,7 @@
 msgid "Proprietary Fraud"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are some examples of proprietary software that defrauds users&mdash;"
 "taking their money by trickery."
@@ -7008,13 +7008,13 @@
 msgid "Proprietary Incompatibility"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One of these malicious functionalities is the deliberate incompatibility of "
 "a program with third party software that operates on the same data types."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A fairly common sort of incompatibility is the use of secret formats or "
 "protocols. This directly blocks or hinders users from switching to any other "
@@ -7022,7 +7022,7 @@
 "liberate the device the software runs on."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Apart from being deliberately anticompetitive, secret formats put users' "
 "digital data at risk. For instance, retrieval of old data will become very "
@@ -7030,7 +7030,7 @@
 "discontinued."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Another sort of incompatibility occurs when a system makes some important "
 "operation which would be necessary for migrating data to any other system so "
@@ -7038,7 +7038,7 @@
 "data."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "More generally, the major tech companies tend to impose <a href=\"https://";
 "www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7071,7 +7071,7 @@
 msgid "Proprietary Insecurity"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7080,7 +7080,7 @@
 "software is not immune to bugs, and is often quite sloppy."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All complex programs, whether free or proprietary, contain bugs. What makes "
 "bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7193,7 +7193,7 @@
 msgid "Proprietary Interference"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "One kind of malicious functionality mediates developer's interference into "
 "the use of the software. This page describes how various proprietary "
@@ -7245,7 +7245,7 @@
 msgid "Proprietary Jails"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The &ldquo;jails&rdquo; are malicious operating systems that are designed to "
 "impose censorship of which applications the user can install.  The <a href="
@@ -7253,14 +7253,14 @@
 "issue."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "These systems are platforms for censorship imposed by the company that owns "
 "the system.  Selling products designed as platforms for a company to impose "
 "censorship ought to be forbidden by law, but it isn't."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "This page lists a few jails, along with some of the methods they use to "
 "censor apps, and includes specific examples of apps that were blocked using "
@@ -7307,14 +7307,14 @@
 msgid "Proprietary Manipulation"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Manipulation of users is one of these malicious functionalities.  Here are "
 "examples of programs that are designed to do this by taking advantage of "
 "human psychology."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
 "\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7333,13 +7333,13 @@
 msgid "Proprietary Obsolescence"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Programmed obsolescence is one of the malicious functionalities that may be "
 "designed into proprietary software."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Computer technology inevitably has an environmental impact, but proprietary "
 "software makes it worse because it is often designed to lead or pressure "
@@ -7347,7 +7347,7 @@
 "discard defective hardware which could have been made repairable."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Here are examples of proprietary programs that make hardware devices "
 "prematurely obsolete."
@@ -7860,7 +7860,7 @@
 msgid "Proprietary Sabotage"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Some malicious functionalities mediate sabotage, i.e. abusive interference "
 "of the developer into the use of the software, with harmful consequences for "
@@ -7975,7 +7975,7 @@
 msgid "Proprietary Subscriptions"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "It sounds simple to say that a certain program &ldquo;requires a "
 "subscription.&rdquo; What that means concretely is that it contains a time "
@@ -7985,7 +7985,7 @@
 "functionality."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Examples of software subscriptions that harmed users directly are given "
 "below."
@@ -8017,7 +8017,7 @@
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A common malicious functionality is to snoop on the user.  This page records "
 "<strong>clearly established cases of proprietary software that spies on or "
@@ -8026,7 +8026,7 @@
 "\">say whether they snoop on users for the state</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "All appliances and applications that are tethered to a specific server are "
 "snoopers by nature.  We do not list them here because they have their own "
@@ -8783,7 +8783,7 @@
 msgid "Proprietary Tethers"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "Tethering a product or program means designing it to work only by "
 "communicating with a specific server.  That is always an injustice since it "
@@ -8791,7 +8791,7 @@
 "injustice if you can't communicate with the server in another way."
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "In some cases, tethering is used to do specific nasty things to the users.  "
 "This page reports instances where tethering was used to harm the users "
@@ -8810,7 +8810,7 @@
 msgid "Proprietary Tyrants"
 msgstr ""
 
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "A <em>tyrant</em> is a malicious device that refuses to allow users to "
 "install a different operating system or a modified operating system.  These "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]