www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 16 Nov 2020 11:04:06 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/16 11:04:05

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.409&r2=1.410
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.558&r2=1.559
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.365&r2=1.366
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.644&r2=1.645
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.505&r2=1.506
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.232&r2=1.233

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- de.po       14 Nov 2020 09:32:55 -0000      1.232
+++ de.po       16 Nov 2020 16:03:56 -0000      1.233
@@ -7369,9 +7369,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- es.po       15 Nov 2020 10:59:57 -0000      1.332
+++ es.po       16 Nov 2020 16:03:57 -0000      1.333
@@ -7215,13 +7215,29 @@
 msgstr "Casi seguro eso quiere decir que puede hacerlo."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
@@ -14174,6 +14190,21 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">obliga a la gente a dar el "
+#~ "número de teléfono</a> cuando crean una cuenta en la red de la 
compañía. "
+#~ "Además de maltratar a los usuarios proporcionándoles software que no es "
+#~ "libre, Microsoft impone su vigilancia y viola la privacidad de la gente."
+
 #, fuzzy
 #~| msgid ""
 #~| "As of August, 2020, the pages in this directory list around 450 "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.409
retrieving revision 1.410
diff -u -b -r1.409 -r1.410
--- fr.po       14 Nov 2020 10:29:13 -0000      1.409
+++ fr.po       16 Nov 2020 16:03:57 -0000      1.410
@@ -6293,13 +6293,29 @@
 msgstr "Cela signifie sûrement qu'il en a la possibilité."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
@@ -12292,3 +12308,19 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">force les gens à donner "
+#~ "leur numéro de téléphone</a> pour créer un compte sur son réseau. Non 
"
+#~ "seulement Microsoft nuit à ses utilisateurs en leur fournissant du "
+#~ "logiciel non libre, mais elle leur impose sa surveillance et viole leur "
+#~ "vie privée."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- it.po       14 Nov 2020 09:32:56 -0000      1.232
+++ it.po       16 Nov 2020 16:03:58 -0000      1.233
@@ -6884,9 +6884,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- ja.po       14 Nov 2020 09:32:56 -0000      1.240
+++ ja.po       16 Nov 2020 16:03:58 -0000      1.241
@@ -5393,9 +5393,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-microsoft.de-diff.html      14 Nov 2020 09:32:57 -0000      1.58
+++ malware-microsoft.de-diff.html      16 Nov 2020 16:03:58 -0000      1.59
@@ -384,8 +384,8 @@
     program&lt;/a&gt; on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
     
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909"&gt;
-    tampering with users' settings and files&lt;/a&gt;, 
notably</em></ins></span> to
-    <span class="inserted"><ins><em>&ldquo;repair&rdquo; any components of the 
updating system that users
+    tampering with users' settings and files&lt;/a&gt;, notably to
+    &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
     users' machines, causing numerous problems, some of which &lt;a
@@ -394,7 +394,7 @@
 
     &lt;p&gt;This exemplifies the arrogant and manipulative attitude
     that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
+    toward the people they are supposedly serving. Migrate</em></ins></span> 
to <span class="inserted"><ins><em>a &lt;a
     href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
     can!&lt;/p&gt;
 
@@ -605,40 +605,33 @@
     <span 
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
     users to <span class="removed"><del><strong>buy subscriptions for the 
OneDrive service.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>create an account on their network&lt;/a&gt; to be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's</strong></del></span> install <span class="removed"><del><strong>base, 
Microsoft</strong></del></span>
-    <span class="inserted"><ins><em>and use the Windows operating system, 
which is malware. The account can
+&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>create an account on their network&lt;/a&gt; to be 
able</em></ins></span> to <span class="removed"><del><strong>increase Windows 
10's</strong></del></span> install <span class="removed"><del><strong>base, 
Microsoft
+&lt;a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice</strong></del></span>
+    and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>use the Windows operating system, which is malware. 
The account can
     be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded</em></ins></span> users <span 
class="removed"><del><strong>obnoxiously</strong></del></span> <span 
class="inserted"><ins><em>of Xboxes and had &lt;a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span>
-    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span 
class="removed"><del><strong>repeatedly</strong></del></span>
+    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
-started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
-users obnoxiously and repeatedly</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908151"&gt;
+  &lt;li id="M201908151"&gt;
     &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>install Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft
-      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> <span 
class="inserted"><ins><em>say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
         tricking
-        users&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>say whether it can</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
-into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
-company's
-sysadmins</strong></del></span>
+        users&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
@@ -646,11 +639,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201905281"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
-users</strong></del></span>
+    &lt;p&gt;Microsoft</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed 
by</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>give their phone number&lt;/a&gt; in 
order</em></ins></span> to <span class="inserted"><ins><em>create an account 
on</em></ins></span>
-    the <span class="removed"><del><strong>sysadmins about not 
&ldquo;upgrading&rdquo; to Windows
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on</em></ins></span>
+    the company's
+<span class="removed"><del><strong>sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue</strong></del></span>
 <span class="inserted"><ins><em>network. On top of mistreating 
their</em></ins></span> users <span class="removed"><del><strong>to complain 
to</strong></del></span> <span class="inserted"><ins><em>by providing
+    nonfree software, Microsoft is tracking their lives 
outside</em></ins></span> the <span class="removed"><del><strong>sysadmins 
about not &ldquo;upgrading&rdquo; to Windows
 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
@@ -658,9 +656,8 @@
 
 &lt;ul&gt;
 
-&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>company's network. On top of mistreating their users 
by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>computer and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710134"&gt;
@@ -1021,7 +1018,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:32:57 $
+$Date: 2020/11/16 16:03:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-microsoft.de.po     14 Nov 2020 09:32:57 -0000      1.154
+++ malware-microsoft.de.po     16 Nov 2020 16:03:58 -0000      1.155
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1027,9 +1027,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- malware-microsoft.es.po     15 Nov 2020 10:59:57 -0000      1.186
+++ malware-microsoft.es.po     16 Nov 2020 16:03:58 -0000      1.187
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -851,13 +852,29 @@
 msgstr "Casi seguro eso quiere decir que puede hacerlo."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- malware-microsoft.fr.po     14 Nov 2020 10:29:13 -0000      1.200
+++ malware-microsoft.fr.po     16 Nov 2020 16:03:58 -0000      1.201
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-11-14 11:25+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -850,13 +851,29 @@
 msgstr "Cela signifie sûrement qu'il en a la possibilité."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-microsoft.it-diff.html      14 Nov 2020 09:32:59 -0000      1.57
+++ malware-microsoft.it-diff.html      16 Nov 2020 16:03:58 -0000      1.58
@@ -643,8 +643,7 @@
     &lt;p&gt;Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
 users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>give their phone number&lt;/a&gt; in 
order</em></ins></span> to <span class="inserted"><ins><em>create an account 
on</em></ins></span>
-    the <span class="removed"><del><strong>sysadmins about not 
&ldquo;upgrading&rdquo; to Windows
+    people</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>give their phone number&lt;/a&gt; in 
order</em></ins></span> to <span class="removed"><del><strong>the sysadmins 
about not &ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to <span 
class="removed"><del><strong>Windows
 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
@@ -652,9 +651,10 @@
 
 &lt;ul&gt;
 
-&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>company's network. On top of mistreating their users 
by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>create an account on
+    the company's network. On top of mistreating their users by providing
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710134"&gt;
@@ -1008,7 +1008,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:32:59 $
+$Date: 2020/11/16 16:03:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- malware-microsoft.it.po     14 Nov 2020 09:32:59 -0000      1.159
+++ malware-microsoft.it.po     16 Nov 2020 16:03:58 -0000      1.160
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -980,9 +980,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-microsoft.ja-diff.html      14 Nov 2020 09:32:59 -0000      1.72
+++ malware-microsoft.ja-diff.html      16 Nov 2020 16:03:58 -0000      1.73
@@ -616,10 +616,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their</em></ins></span> users 
<span class="removed"><del><strong>obnoxiously</strong></del></span> <span 
class="inserted"><ins><em>by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710134"&gt;
@@ -982,7 +982,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:32:59 $
+$Date: 2020/11/16 16:03:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- malware-microsoft.ja.po     14 Nov 2020 09:32:59 -0000      1.139
+++ malware-microsoft.ja.po     16 Nov 2020 16:03:58 -0000      1.140
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -805,9 +805,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-microsoft.pot       14 Nov 2020 09:32:59 -0000      1.97
+++ malware-microsoft.pot       16 Nov 2020 16:03:58 -0000      1.98
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -588,10 +588,10 @@
 msgid ""
 "Microsoft <a "
 
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
 "
-"people to give their phone number</a> in order to create an account on the "
-"company's network. On top of mistreating their users by providing nonfree "
-"software, Microsoft is imposing surveillance on people and violating their "
-"privacy."
+"people to give their phone number</a> in order to be able to create an "
+"account on the company's network. On top of mistreating their users by "
+"providing nonfree software, Microsoft is tracking their lives outside the "
+"computer and violates their privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- malware-microsoft.ru.po     14 Nov 2020 09:32:59 -0000      1.239
+++ malware-microsoft.ru.po     16 Nov 2020 16:03:59 -0000      1.240
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -851,9 +851,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- nl.po       14 Nov 2020 09:32:59 -0000      1.233
+++ nl.po       16 Nov 2020 16:03:59 -0000      1.234
@@ -4954,9 +4954,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- pl.po       14 Nov 2020 09:32:59 -0000      1.232
+++ pl.po       16 Nov 2020 16:03:59 -0000      1.233
@@ -4434,9 +4434,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- pot 14 Nov 2020 09:32:59 -0000      1.231
+++ pot 16 Nov 2020 16:03:59 -0000      1.232
@@ -4166,9 +4166,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-surveillance.de-diff.html       14 Nov 2020 09:33:00 -0000      
1.139
+++ proprietary-surveillance.de-diff.html       16 Nov 2020 16:03:59 -0000      
1.140
@@ -2952,29 +2952,29 @@
     at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed through</strong></del></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through the modem.  However, even if it asked for
     authentication, you couldn't be confident that Nissan has no
     access.  The software</strong></del></span> <span 
class="inserted"><ins><em>present, but</em></ins></span> in the <span 
class="removed"><del><strong>car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
+    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> <span class="inserted"><ins><em>past (and, who 
knows,
+    in</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
@@ -3204,67 +3204,66 @@
       picked up by proprietary malware</strong></del></span> running <span 
class="removed"><del><strong>on other devices in
       range so as to determine that they are nearby.  Once your
       Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> with <span 
class="removed"><del><strong>Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>proprietary 
software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
+      correlate ads</strong></del></span> with <span 
class="removed"><del><strong>Web activity,</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span> <span 
class="inserted"><ins><em>junkyard</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes with
+
+  &lt;li id="M201903290"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
+      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data goes with
     them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network</em></ins></span> and 
<span class="removed"><del><strong>would then</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
-    including car location. This feature operates even when the ignition
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>to
-      give it to</strong></del></span> <span class="inserted"><ins><em>you 
succeeded in breaking</em></ins></span> the <span 
class="removed"><del><strong>US</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem,</em></ins></span> or <span class="removed"><del><strong>some other 
government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>wrapping the
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
-    cars</em></ins></span> to be <span class="removed"><del><strong>trusted 
unless</strong></del></span> <span class="inserted"><ins><em>equipped with a 
terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
     to a government-run platform&lt;/a&gt;. In practice, &lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward</em></ins></span> it <span class="removed"><del><strong>is done
-    by free software</strong></del></span> <span class="inserted"><ins><em>to 
the government-run platform.&lt;/p&gt;
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM &lt;a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked the choices of radio programs&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In</strong></del></span> its <span 
class="removed"><del><strong>privacy policy, Samsung explicitly 
confirms</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;connected&rdquo; cars, minute by 
minute.&lt;/p&gt;
-
-    &lt;p&gt;GM did not get users' consent, but it could have 
got</em></ins></span> that <span class="removed"><del><strong>&lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>easily by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want</em></ins></span> to
@@ -3611,20 +3610,7 @@
     code.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites use 
JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a form but not
-    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Flash Player's
-      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites 
use</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -3635,20 +3621,32 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
-    &lt;p&gt;Flash</em></ins></span> and JavaScript are <span 
class="removed"><del><strong>also</strong></del></span> used for &lt;a
+    &lt;p&gt;Flash and</em></ins></span> JavaScript <span 
class="removed"><del><strong>code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a form but not
+    sent&lt;/a&gt;, in order to learn their identity. 
Some</strong></del></span> are <span class="removed"><del><strong>&lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> for <span 
class="removed"><del><strong>this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
-    &lt;p&gt;Flash Player's &lt;a
+    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
     cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash and JavaScript 
are also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
@@ -3768,20 +3766,13 @@
       <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
       proprietary software</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people</em></ins></span> to <span class="removed"><del><strong>make sure 
they can't &ldquo;fool&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>give their phone number&lt;/a&gt; in order to create 
an account on</em></ins></span>
-    the 
-      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>company's network. On top of mistreating their 
users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;</em></ins></span>
+    people to give their phone number&lt;/a&gt; in order</em></ins></span> to 
<span class="removed"><del><strong>make sure they can't &ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902040"&gt;
-    &lt;p&gt;Google invites people</em></ins></span> to <span 
class="removed"><del><strong>listen for speech</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
-    let Google monitor their phone use, and</em></ins></span> all <span 
class="removed"><del><strong>the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will</strong></del></span> be able to <span 
class="removed"><del><strong>listen for speech all</strong></del></span> <span 
class="inserted"><ins><em>create an account on</em></ins></span>
+    the <span class="removed"><del><strong>time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3793,8 +3784,16 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
-      potential</strong></del></span> <span class="inserted"><ins><em>internet 
use in their
+  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, 
creates</strong></del></span> <span class="inserted"><ins><em>company's 
network. On top of mistreating their users by providing
+    nonfree software, Microsoft is tracking their lives 
outside</em></ins></span> the
+      <span class="removed"><del><strong>potential</strong></del></span> <span 
class="inserted"><ins><em>computer and
+    violates their privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902040"&gt;
+    &lt;p&gt;Google invites people to &lt;a
+    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
+    let Google monitor their phone use, and all internet use in their
     homes,</em></ins></span> for <span class="inserted"><ins><em>an 
extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is not a malicious functionality of a program with some other
@@ -3890,7 +3889,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:00 $
+$Date: 2020/11/16 16:03:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary-surveillance.de.po      14 Nov 2020 09:33:00 -0000      1.353
+++ proprietary-surveillance.de.po      16 Nov 2020 16:03:59 -0000      1.354
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5636,9 +5636,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary-surveillance.es.po      15 Nov 2020 10:59:57 -0000      1.99
+++ proprietary-surveillance.es.po      16 Nov 2020 16:03:59 -0000      1.100
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-11-15 11:43+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -5062,13 +5063,29 @@
 "\">#SpywareInNetworks</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.558
retrieving revision 1.559
diff -u -b -r1.558 -r1.559
--- proprietary-surveillance.fr.po      14 Nov 2020 10:29:13 -0000      1.558
+++ proprietary-surveillance.fr.po      16 Nov 2020 16:03:59 -0000      1.559
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-11-14 11:25+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -5076,13 +5077,29 @@
 "\">#SpywareInNetworks</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary-surveillance.it-diff.html       14 Nov 2020 09:33:00 -0000      
1.205
+++ proprietary-surveillance.it-diff.html       16 Nov 2020 16:04:00 -0000      
1.206
@@ -613,8 +613,7 @@
     especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>Biden's 
app has a less manipulative overall
+    &lt;p&gt;The article says that Biden's app has a less manipulative overall
     approach, but that does not tell us whether it has functionalities we
     consider malicious, such as sending data the user has not explicitly
     asked to send.&lt;/p&gt;
@@ -623,14 +622,14 @@
   &lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
-    proprietary <span class="removed"><del><strong>apps, 
one</strong></del></span> <span class="inserted"><ins><em>software to make sure 
they can't &ldquo;fool&rdquo;
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
     the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
     &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>only hope</strong></del></span> <span 
class="inserted"><ins><em>take over
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
     them to turn the phones on and off, listen to the microphone,
     retrieve geo-location data from the GPS, take photographs, read
@@ -644,7 +643,7 @@
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via
+    detail here, it seems that this does not operate via
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
@@ -1442,17 +1441,20 @@
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1472,14 +1474,16 @@
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704074"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
     &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    study found tens of thousands of pairs that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
@@ -1557,12 +1561,16 @@
       five tracking libraries. Developers of this app have confirmed that
       the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1570,109 +1578,102 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who is
+    in</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>pictures are 
likely</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>Conditions&rdquo; that spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If so, none of Facebook users' pictures</em></ins></span> are 
<span class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should 
clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>private anymore,
+    even if</em></ins></span> the <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in 
stores</strong></del></span> or <span class="removed"><del><strong>played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In 
addition,</em></ins></span>
+    it <span class="removed"><del><strong>collects</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's conversations to serve them 
with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps</strong></del></span>
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy</em></ins></span> on <span class="removed"><del><strong>users, 
instead</strong></del></span> <span class="inserted"><ins><em>many 
sorts</em></ins></span> of <span class="removed"><del><strong>hiding 
it</strong></del></span> <span class="inserted"><ins><em>data</em></ins></span> 
in <span class="removed"><del><strong>an obscurely worded EULA.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not 
only</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal
-       data to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
+&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>the 
phone,</em></ins></span> and <span class="removed"><del><strong>other companies 
from getting this personal information</strong></del></span> in <span 
class="inserted"><ins><em>server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
+    &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    unrelated to</em></ins></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>personal 
details of users</strong></del></span> <span class="inserted"><ins><em>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
+    to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and location information&lt;/a&gt;</em></ins></span> 
of <span class="inserted"><ins><em>their</em></ins></span> users <span 
class="removed"><del><strong>is not enough
-to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>with
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
+    legitimate, but</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>that valid? 
Software developers have no right</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when it's actually</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users are</em></ins></span> 
doing <span class="removed"><del><strong>something else.  Such a thing would be 
almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+    &lt;p&gt;More</em></ins></span> than 73% <span 
class="inserted"><ins><em>and 47%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android 
<span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
+    personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like</em></ins></span> most <span 
class="removed"><del><strong>users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;music screaming&rdquo; disservices, Spotify is
-    based</em></ins></span> on <span class="removed"><del><strong>users, 
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>proprietary 
malware (DRM and snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>some are 
starting
+    demanded users submit</em></ins></span> to <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are starting
     to realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span>
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want 
that.</em></ins></span> This is
-    <span class="removed"><del><strong>yet another</strong></del></span> <span 
class="inserted"><ins><em>a
-    typical</em></ins></span> example of <span 
class="removed"><del><strong>nonfree</strong></del></span> <span 
class="inserted"><ins><em>the attitude of the proprietary</em></ins></span> 
software <span class="removed"><del><strong>pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>industry
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
+    typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1681,127 +1682,152 @@
   &lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
-    Android apps contained recognizable tracking libraries. For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;
+    A study</em></ins></span> in <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of</em></ins></span> 
the <span class="removed"><del><strong>500 most popular</strong></del></span> 
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span 
class="inserted"><ins><em>proprietary</em></ins></span>
+    Android <span 
class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>apps contained recognizable tracking libraries. 
For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these</strong></del></span> <span 
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
+  <span 
class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of 
them</em></ins></span> are not <span class="removed"><del><strong>free 
software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>granted</strong></del></span> that <span 
class="removed"><del><strong>the usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
+    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>location information&lt;/a&gt; of 
their users with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on the 
average.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used &lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</em></ins></span> to
-    the <span class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>snooping done by 
the phone company, and perhaps by the OS</em></ins></span> in
-    the <span class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop</em></ins></span> on the <span 
class="removed"><del><strong>system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users</em></ins></span> to say
-  <span class="removed"><del><strong>&ldquo;zero 
price&rdquo;</strong></del></span> <span class="inserted"><ins><em>&ldquo;I 
agree&rdquo;. That</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>no excuse</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span>
-    <span class="inserted"><ins><em>malware.&lt;/p&gt;
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This is in addition</em></ins></span> 
to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way</strong></del></span>
+    <span class="inserted"><ins><em>the phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users</em></ins></span> to <span class="removed"><del><strong>use it 
without having your fingerprints
+      taken. Users would have</strong></del></span> <span 
class="inserted"><ins><em>say &ldquo;I agree&rdquo;. That is</em></ins></span> 
no <span class="inserted"><ins><em>excuse for
+    malware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
-    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
-    is <span class="removed"><del><strong>that valid?  Software developers 
have no right to
-  analyze what users are</strong></del></span> doing <span 
class="removed"><del><strong>or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>this in a 
way</em></ins></span> that <span class="removed"><del><strong>snoop are
-  just</strong></del></span> <span class="inserted"><ins><em>at least is 
visible and optional&lt;/a&gt;. Not</em></ins></span>
-    as <span class="removed"><del><strong>wrong</strong></del></span> <span 
class="inserted"><ins><em>bad</em></ins></span> as <span 
class="removed"><del><strong>any</strong></del></span> <span 
class="inserted"><ins><em>what the others do.&lt;/p&gt;
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a</em></ins></span> way <span 
class="removed"><del><strong>to tell whether</strong></del></span> <span 
class="inserted"><ins><em>that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    &lt;p&gt;The Simeji keyboard</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>a smartphone version of Baidu's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312270"&gt;
     &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
+    use</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> data <span 
class="inserted"><ins><em>on the user's computer, but it does surveillance too: 
&lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's phone
+    it tries</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers&lt;/a&gt;.  Big Brother can</strong></del></span> get <span 
class="removed"><del><strong>them from there.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the user's list of other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Brightest Flashlight</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends</em></ins></span> user <span class="removed"><del><strong>types into 
it&lt;/a&gt;; the server records these numbers</strong></del></span> <span 
class="inserted"><ins><em>data, including geolocation,</em></ins></span> for 
<span class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>use by companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but 
did</em></ins></span> not <span class="removed"><del><strong>&lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span class="inserted"><ins><em>ask
-    about sending it</em></ins></span> to <span 
class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>other 
companies.  This shows</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>weakness of
-    the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
-    <span class="inserted"><ins><em>surveillance: why should a flashlight 
app</em></ins></span> send <span class="removed"><del><strong>personal 
data</strong></del></span> <span class="inserted"><ins><em>any 
information</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
+    approve sending personal data</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>app 
developer but did not ask
+    about sending it</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>other companies.  This shows the 
weakness</em></ins></span> of
+    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+    surveillance: why should a flashlight app send any information to
+    anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span>
+  &lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says</em></ins></span> most <span 
class="removed"><del><strong>popular iOS</strong></del></span> <span 
class="inserted"><ins><em>mobile</em></ins></span> apps <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>say whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
@@ -1815,170 +1841,180 @@
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the 
phone</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202010221"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>snooping</strong></del></span> <span 
class="inserted"><ins><em>imposing its
-    surveillance</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span class="inserted"><ins><em>the 
game</em></ins></span> of <span class="removed"><del><strong>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores</strong></del></span> <span 
class="inserted"><ins><em>game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring</em></ins></span>
+    every <span class="removed"><del><strong>photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>player</em></ins></span> to <span 
class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>open an account</em></ins></span> on <span 
class="inserted"><ins><em>Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge</em></ins></span> all <span 
class="removed"><del><strong>your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring</em></ins></span>
-    every <span class="removed"><del><strong>phone number 
that</strong></del></span> <span class="inserted"><ins><em>player to open an 
account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought</em></ins></span> the <span class="removed"><del><strong>user 
types</strong></del></span> <span class="inserted"><ins><em>game and will merge 
all accounts</em></ins></span> into <span 
class="removed"><del><strong>it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>its network,
+    &lt;p&gt;(From</strong></del></span> <span 
class="inserted"><ins><em>accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
-    &lt;p&gt;Minecraft players &lt;a
-    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.)</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
+    instead.</em></ins></span> The <span class="removed"><del><strong>iCloud 
feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup</strong></del></span> <span class="inserted"><ins><em>essential 
advantage</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>Minetest</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>that</em></ins></span> 
it <span class="removed"><del><strong>still counts as</strong></del></span> 
<span class="inserted"><ins><em>is free
+    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+  &lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded users</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Xboxes and had</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+      the &lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral</strong></del></span>
+    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span>
+    is <span class="removed"><del><strong>still true</strong></del></span> 
<span class="inserted"><ins><em>found</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users 
with</strong></del></span> <span class="inserted"><ins><em>sends it 
to</em></ins></span> third <span 
class="removed"><del><strong>parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tracks</em></ins></span> data <span class="removed"><del><strong>from 
iPhones for the state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> the 
<span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>massive
+    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on all <span 
class="removed"><del><strong>your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to</em></ins></span> snoop on all <span class="removed"><del><strong>the 
data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed</strong></del></span> <span 
class="inserted"><ins><em>open processes running</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud feature 
is</strong></del></span> <span class="inserted"><ins><em>its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</strong></del></span>
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    information</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
-    &lt;p&gt;Many &lt;a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to</em></ins></span> 
the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span>
+    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop</em></ins></span> on <span 
class="inserted"><ins><em>their users</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read the contact list. This 
malware</strong></del></span>
     <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is a <span 
class="removed"><del><strong>way to</strong></del></span> <span 
class="inserted"><ins><em>computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
+    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-    collected</em></ins></span> by <span class="removed"><del><strong>default 
so it still counts as a
-      surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of</strong></del></span> 
<span class="inserted"><ins><em>various cr&hellip;apps and sites made by 
different
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span> <span class="inserted"><ins><em>data
+    collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use</em></ins></span> this <span 
class="inserted"><ins><em>data</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span> <span 
class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>buy things, and hunt for
-    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>access any</strong></del></span> <span 
class="inserted"><ins><em>be led to spend a lot</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>money. They</em></ins></span> also
-    <span class="inserted"><ins><em>use</em></ins></span> a <span 
class="removed"><del><strong>feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That</strong></del></span> <span 
class="inserted"><ins><em>manipulate the game play for specific 
players.&lt;/p&gt;
-
-    &lt;p&gt;While the</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;They use this data to manipulate people to buy things, and 
hunt</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;whales&rdquo; who can be led to 
spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span class="inserted"><ins><em>describes gratis 
games, games</em></ins></span> that <span class="inserted"><ins><em>cost 
money</em></ins></span>
-    can <span class="removed"><del><strong>be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>use the same tactics.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies</em></ins></span> for <span class="removed"><del><strong>the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span> <span class="inserted"><ins><em>cost 
money</em></ins></span>
+    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>companies, and</em></ins></span> the NSA <span 
class="removed"><del><strong>snoop on all the data in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>takes advantage
-    to spy through</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -1986,75 +2022,45 @@
     More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a hidden
-    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies</em></ins></span> on
+      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
+    have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
-<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>turn the 
phones</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>and off, listen to the microphone, retrieve 
geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read</strong></del></span> the <span 
class="removed"><del><strong>contact list. This malware is designed to
-      disguise itself from investigation.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="inserted"><ins><em>people that</em></ins></span> use <span 
class="removed"><del><strong>of data</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> that <span 
class="removed"><del><strong>their transmission is</strong></del></span> <span 
class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject</em></ins></span> all the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the <span class="removed"><del><strong>GPS and 
microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2062,73 +2068,68 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you</em></ins></span> on <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>other 
way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
-    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. 
This</em></ins></span> is <span class="inserted"><ins><em>illegal 
due</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
-    the <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span> of 
<span class="removed"><del><strong>data on the user's 
computer,</strong></del></span> <span 
class="inserted"><ins><em>1988,</em></ins></span> but <span 
class="inserted"><ins><em>they're circumventing</em></ins></span>
-    it <span class="removed"><del><strong>does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>through 
EULAs.&lt;/p&gt;
+    &lt;p&gt;TV manufacturers are able to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal 
due</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span> 
of <span class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>user's list</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>other people's 
phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the company's
-    CTO, and this data is sold to third parties. This is</em></ins></span> in 
<span class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging by 
+               &lt;p&gt;Faceapp appears to do lots</strong></del></span> <span 
class="inserted"><ins><em>the own words</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, 
according</em></ins></span> to <span class="removed"><del><strong>personal 
data</strong></del></span> <span class="inserted"><ins><em>him,
-    is that it is opt-in</em></ins></span> in <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               how much access it demands to personal</strong></del></span> 
<span class="inserted"><ins><em>the company's
+    CTO, and this</em></ins></span> data <span class="inserted"><ins><em>is 
sold to third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>the device&lt;/a&gt;.
                &lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some of its phones. The app</strong></del></span> <span 
class="inserted"><ins><em>all future updates</em></ins></span> will <span 
class="removed"><del><strong>give Verizon</strong></del></span> <span 
class="inserted"><ins><em>leave</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about the users' searches</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+        announced an opt-in proprietary search app</strong></del></span> <span 
class="inserted"><ins><em>return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, 
for</em></ins></span> that <span class="removed"><del><strong>Google normally 
gets when
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is</em></ins></span> that it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>is opt-in in 
newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>users' searches</strong></del></span> 
<span class="inserted"><ins><em>scenes,
+    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>easiest way to make sure it isn't 
spying</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;, and</strong></del></span> <span class="inserted"><ins><em>you 
is
-    to disconnect it from</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>Internet, and use 
a terrestrial antenna
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>all future updates will leave</em></ins></span> the 
<span class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
+    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>you is
+    to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
+    be an old computer running completely free software),</em></ins></span> 
and <span class="inserted"><ins><em>set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
@@ -2138,14 +2139,15 @@
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>article for</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It</em></ins></span>
-    is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+    &lt;p&gt;We link to</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>article 
for</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>facts it 
presents. It
+    is too bad that</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating the
+    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The 
Netflix</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
   user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
@@ -2201,13 +2203,12 @@
 scans</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who
-      is in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
     <span class="inserted"><ins><em>across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2259,29 +2260,28 @@
     is doing this in a way that at least is visible</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops on what programs people watch,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>they wanted to
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
     record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs</em></ins></span> 
snoop on <span class="inserted"><ins><em>what
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
+    used <span class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to 
make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
       <span class="removed"><del><strong>the snooping done by the 
phone</strong></del></span> <span 
class="inserted"><ins><em>another</em></ins></span> company, <span 
class="inserted"><ins><em>Nuance&lt;/a&gt;.
     Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
       <span class="removed"><del><strong>phone.&lt;/p&gt;
@@ -2289,55 +2289,53 @@
       &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>US 
or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span 
class="inserted"><ins><em>free
+    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers</strong></del></span> 
<span class="inserted"><ins><em>2014, but we don't expect this has got
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014, but we don't expect</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to</em></ins></span> get
-      <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>users' formal
-    consent before collecting personal data are totally inadequate.
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to
+      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>get users' formal
+    consent before collecting</em></ins></span> personal data <span 
class="inserted"><ins><em>are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking, the TV will not
-    work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would</em></ins></span> say <span 
class="removed"><del><strong>&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that 
TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>TV will</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
+    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the</em></ins></span> user <span 
class="removed"><del><strong>data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized</strong></del></span> <span 
class="inserted"><ins><em>watches, and the switch to turn</em></ins></span> 
this <span class="removed"><del><strong>app because it 
asked</strong></del></span> <span class="inserted"><ins><em>off has
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal</strong></del></span> <span 
class="inserted"><ins><em>server could save that</em></ins></span> data <span 
class="removed"><del><strong>to the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the
       <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
@@ -2428,15 +2426,17 @@
 &lt;div class="big-subsection"&gt;
   &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
       can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
@@ -2476,32 +2476,28 @@
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
     true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+    broker, the data broker would have <span class="removed"><del><strong>been 
able to figure out
+      who the user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
@@ -2522,21 +2518,16 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
 &lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
 Note that the specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2550,339 +2541,425 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>been able to figure out who</em></ins></span> the 
<span class="removed"><del><strong>emails of members of 
Parliament</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      Microsoft changed Skype</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
 
+    &lt;p&gt;That</em></ins></span> the manufacturer <span 
class="removed"><del><strong>is using it</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202009270"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M202009270"&gt;
     &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    software, including videoconference software, to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil</em></ins></span> and <span class="removed"><del><strong>make 
changes</strong></del></span> <span class="inserted"><ins><em>monitor staff 
working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is</em></ins></span> in <span 
class="removed"><del><strong>various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
-    &lt;p&gt;Google</em></ins></span> Nest <span 
class="removed"><del><strong>Cam &ldquo;smart&rdquo; 
camera</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
-    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out a software
-    update to its speaker devices using their back door</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>its speaker 
devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm is happening. This</em></ins></span> means the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>devices now listen for more
-    than just their wake words. Google says the software update was sent
+    that an alarm is happening. This means</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>devices now listen for more
+    than just their wake words. Google says</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>software update was sent
     out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering</em></ins></span> it to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>customers who pay for it.&lt;/p&gt;</em></ins></span>
+    this new feature and offering</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>to customers who pay</em></ins></span> for
+    <span class="removed"><del><strong>authentication, you couldn't be 
confident</strong></del></span> <span class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    coerce workers into installing</em></ins></span> in <span 
class="inserted"><ins><em>their own computers&lt;/a&gt;, so</em></ins></span> 
the <span class="removed"><del><strong>car</strong></del></span>
+    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>their own computers&lt;/a&gt;, so the
-    bosses</em></ins></span> can <span class="removed"><del><strong>contain 
Javascript code,</strong></del></span> <span class="inserted"><ins><em>spy on 
them.&lt;/p&gt;
-
-    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span class="inserted"><ins><em>not
     an adequate basis for protecting digital privacy.  The boss can coerce
     most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal</em></ins></span> and <span class="inserted"><ins><em>bosses 
that demand it should be prosecuted for it.&lt;/p&gt;
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>household
+    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
+    modem enables the phone company to track</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and snoop 
on</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>wifi 
password would not be sufficient to carry
-    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>e-reader</strong></del></span> <span 
class="inserted"><ins><em>devices implemented proper
+    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not be 
sufficient</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span class="inserted"><ins><em>carry
+    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>devices implemented proper
     security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also</em></ins></span> used by 
<span class="removed"><del><strong>most US libraries,</strong></del></span> 
<span class="inserted"><ins><em>their
-    manufacturers for snooping.&lt;/p&gt;
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when 
one</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>Google's
-    subcontractors discloses a thousand confidential voice recordings,
+    when it</em></ins></span> is <span class="removed"><del><strong>made 
available</strong></del></span> <span class="inserted"><ins><em>not 
supposed</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>listen&lt;/a&gt;. Thus, when one</em></ins></span> of 
<span class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
+      really</strong></del></span> <span class="inserted"><ins><em>Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but the invasion isn't done by malware. The other
+      cases mentioned are done by</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>see or 
control what it records or sends.&lt;/p&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses</em></ins></span> 
proprietary <span class="removed"><del><strong>malware in the 
car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>software, there is no
+    way</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
+      determine the car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>see or control 
what</em></ins></span> it <span class="removed"><del><strong>doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Nest thermometers</strong></del></span> send <span 
class="removed"><del><strong>&lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+    recordings made without</em></ins></span> a <span 
class="removed"><del><strong>woman came up to me</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse,</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers, 
which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>system has no authentication 
when</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be</em></ins></span> accessed <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>by
-    advertising companies and government agencies. In other words,
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain</em></ins></span> on <span 
class="removed"><del><strong>them,</strong></del></span> <span 
class="inserted"><ins><em>other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the 
servers</em></ins></span>
-    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are 
tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
-    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
+    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> the <span class="removed"><del><strong>image is coming 
from</strong></del></span> <span class="inserted"><ins><em>Sonos
+    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
+    the <span class="removed"><del><strong>TV reports what it is. The 
existence of a way</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they are made 
available</em></ins></span> to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
+    at home,</em></ins></span> not <span class="removed"><del><strong>hidden 
as it was</strong></del></span> <span 
class="inserted"><ins><em>only</em></ins></span> in
+    <span class="removed"><del><strong>these TVs, does not 
legitimize</strong></del></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>the Alexa service 
staff even</em></ins></span> has <span class="removed"><del><strong>got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+    location and other</em></ins></span> personal <span 
class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since the client program is nonfree, and</em></ins></span> data 
<span class="removed"><del><strong>are totally inadequate.
+      And</strong></del></span> <span class="inserted"><ins><em>processing is 
done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    to know</em></ins></span> what happens <span 
class="removed"><del><strong>if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
-    paying for the subscription,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+  &lt;li id="M201902080"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
+    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
+    specific cases, it spies</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
+    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be in
+    working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
-      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>product</em></ins></span> in <span 
class="inserted"><ins><em>that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>say no?&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would</em></ins></span> be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running on other devices in
+      range so</strong></del></span> <span class="inserted"><ins><em>much
+    easier for Amazon. And if some government such</em></ins></span> as <span 
class="inserted"><ins><em>China or the US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell the product 
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.  
Once your
+      Internet devices</strong></del></span> <span 
class="inserted"><ins><em>country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers</em></ins></span> are <span 
class="removed"><del><strong>paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>probably 
hackers too, but please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially 
spying</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped, it could be saving up 
records
-    about you for later examination.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gratis 
electronic toothbrush that snoops on its user by
+    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in the house,</em></ins></span> all the 
time&lt;/a&gt;.&lt;/p&gt;
+
+    <span class="inserted"><ins><em>&lt;p&gt;Today's technological practice 
does not include any way of making
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+  &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>companies
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2894,54 +2971,34 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. 
They</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
-
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and 
<span class="removed"><del><strong>cable&lt;/a&gt;. Even if the image is 
coming</strong></del></span> from the <span class="removed"><del><strong>user's 
own
-    computer, the TV reports what it is. The existence of a way to
-    disable</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
+    privacy. In addition, they</em></ins></span> have <span 
class="inserted"><ins><em>a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people)</em></ins></span> to
+      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
-      not work.&rdquo;&lt;/p&gt;
+  &lt;li id="M201603020"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>back door, but</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to report <span class="removed"><del><strong>what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its location to someone else and to transmit 
conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2951,223 +3008,197 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
-    &lt;p&gt;New Toyotas will</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    &lt;p&gt;New Toyotas will &lt;a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    upload data</em></ins></span> to <span class="removed"><del><strong>the US 
or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>AWS</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
+    by</strong></del></span> <span class="inserted"><ins><em>help create 
custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can <span 
class="removed"><del><strong>track</strong></del></span>
-    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If</em></ins></span> you 
-      <span class="removed"><del><strong>across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>want
-    GPS navigation, get a separate navigator which runs free software
-    and works with Open Street Map.&lt;/p&gt;
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
+    GPS navigation, get a separate navigator which runs</em></ins></span> free 
software <span class="removed"><del><strong>in your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that</strong></del></span>
+    <span class="inserted"><ins><em>and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars now &lt;a
-    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as</em></ins></span> it 
<span class="removed"><del><strong>enabled by default</strong></del></span> 
<span class="inserted"><ins><em>involves
-    cracking the car's computer, which</em></ins></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information will be 
transmitted</strong></del></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span> 
the <span class="removed"><del><strong>user watches, and</strong></del></span> 
<span class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>user, access</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact that the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> the <span class="removed"><del><strong>server
+      could save that</strong></del></span> data <span 
class="removed"><del><strong>anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>is nearly impossible, as</em></ins></span> it
+      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>involves
+    cracking</em></ins></span> the <span class="removed"><del><strong>user's 
local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+      could spy this way.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running</em></ins></span> with 
<span class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span>
-    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do</strong></del></span> <span class="inserted"><ins><em>car's computer, which 
is always hidden and running with
+    proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    &lt;p&gt;Tesla cars collect</em></ins></span> lots of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>personal data,</em></ins></span> and <span 
class="removed"><del><strong>even what</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+    when</em></ins></span> they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford</em></ins></span> a 
<span class="removed"><del><strong>spyware app for its headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>lot of 
data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
-    antenna</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars, have you succeeded in 
breaking</em></ins></span> the <span class="removed"><del><strong>app would 
record</strong></del></span>
+    <span class="inserted"><ins><em>connectivity by 
disconnecting</em></ins></span> the <span class="removed"><del><strong>names 
of</strong></del></span> <span class="inserted"><ins><em>cellular modem, or 
wrapping</em></ins></span> the <span class="removed"><del><strong>audio files
+users listen</strong></del></span>
+    <span class="inserted"><ins><em>antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    cars</em></ins></span> to <span 
class="removed"><del><strong>along</strong></del></span> <span 
class="inserted"><ins><em>be equipped</em></ins></span> with <span 
class="removed"><del><strong>the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>a terminal</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>was done without</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; as part of their own spying, then
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+  &lt;li id="M201810230"&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    tracked</em></ins></span> the <span class="removed"><del><strong>fine 
print</strong></del></span> <span 
class="inserted"><ins><em>choices</em></ins></span> of <span 
class="inserted"><ins><em>radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
-    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into</em></ins></span> the <span 
class="removed"><del><strong>app said</strong></del></span> <span 
class="inserted"><ins><em>contract</em></ins></span> that users <span 
class="removed"><del><strong>gave consent</strong></del></span> <span 
class="inserted"><ins><em>sign</em></ins></span> for <span 
class="removed"><del><strong>this,
+would</strong></del></span> <span class="inserted"><ins><em>some digital 
service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of</em></ins></span> that <span 
class="inserted"><ins><em>data.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports a 404 error really means nothing; the server
-      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree 
software</em></ins></span> are <span class="removed"><del><strong>suing Bose 
for</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  &lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
+    access its computers remotely and</em></ins></span> make <span 
class="inserted"><ins><em>changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if</em></ins></span> it 
<span class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
+    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
-    it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>extract
-    data remotely and determine the car's location</em></ins></span>
-    at <span class="removed"><del><strong>all&lt;/a&gt;.
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>any time. (See Section 2, paragraphs 
b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
-    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
+      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
+    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
-
-    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span class="removed"><del><strong>wide 
range</strong></del></span> <span 
class="inserted"><ins><em>matter</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
-      friends</strong></del></span> <span 
class="inserted"><ins><em>proprietary surveillance. These systems
-    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
-    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201303250"&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
+    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
       companies.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door</strong></del></span> <span class="inserted"><ins><em>matter of 
proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
+    anonymous payment systems, but the invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3181,10 +3212,8 @@
   &lt;li id="M202008182"&gt;
     &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
-      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
-      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
-    free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
+    users to identify themselves</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
@@ -3213,14 +3242,17 @@
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy on <span 
class="removed"><del><strong>their visitors.  Web sites are not
-   programs, so it</strong></del></span> <span class="inserted"><ins><em>their 
visitors.  Web sites are not
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
    programs, so it
    &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
    but the surveillance is an abuse all the same.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;When</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
@@ -3233,22 +3265,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical 
tag</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent</em></ins></span> the <span class="removed"><del><strong>surveillance 
is an abuse all</strong></del></span> <span class="inserted"><ins><em>precise 
GPS location to Twitter's server&lt;/a&gt;. It still
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
     contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-    on</em></ins></span> the <span class="removed"><del><strong>same.&lt;/p&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;When</strong></del></span> <span 
class="inserted"><ins><em>reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701060"&gt;
@@ -3266,63 +3292,54 @@
     &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
     businesses to show different people different prices&lt;/a&gt;. Most of
-    the tracking is done by recording interactions with servers, but
-    proprietary software contributes.&lt;/p&gt;
+    the <span class="removed"><del><strong>tracking is done by recording 
interactions with
+      servers, but proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tracking is done by recording interactions with 
servers, but
+    proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
+  &lt;li id="M201405140"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
-    data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Microsoft SkyDrive allows the NSA to directly examine users'
+    data&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201210240"&gt;
-    &lt;p&gt;Many</em></ins></span> web sites rat their visitors to advertising
+  &lt;li id="M201210240"&gt;
+    &lt;p&gt;Many web sites rat their visitors to advertising
     networks that track users.  Of the top 1000 web sites, &lt;a
     
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
     (as of 5/17/2012) fed their visitors third-party cookies, allowing
     other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
-    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
+  &lt;li id="M201208210"&gt;
+    &lt;p&gt;Many web sites report all their visitors
     to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
-    &lt;p&gt;Many</em></ins></span> web sites try to collect users' address 
books (the user's list
+  &lt;li id="M201200000"&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
     of other people's phone numbers or email addresses).  This violates
-    the privacy of those other people.&lt;/p&gt;
+    the privacy of those other people.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Pages</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
-    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
-    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    &lt;p&gt;Pages</em></ins></span> that contain &ldquo;Like&rdquo; buttons 
&lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</em></ins></span>
     enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
     that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3332,15 +3349,16 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
-    &lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a
+    &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>rat their visitors</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>advertising 
networks</strong></del></span> <span class="inserted"><ins><em>snoop on 
information</em></ins></span> that <span class="removed"><del><strong>track
+      users.  Of</strong></del></span> <span class="inserted"><ins><em>users 
have typed into a
     form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>same sort of
-    malware</em></ins></span> to <span class="removed"><del><strong>directly 
examine users' data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span class="removed"><del><strong>top 
1000</strong></del></span> <span class="inserted"><ins><em>same sort of
+    malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
     read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3348,13 +3366,15 @@
   &lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
+    JavaScript on its</em></ins></span> web <span 
class="removed"><del><strong>sites,</strong></del></span> <span 
class="inserted"><ins><em>site to give other companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
-    &lt;p&gt;Some JavaScript malware &lt;a
-    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    &lt;p&gt;Some JavaScript malware</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3385,59 +3405,79 @@
   &lt;li id="M201003010"&gt;
     &lt;p&gt;Flash Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;</strong></del></span>
-
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201906220"&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome <span 
class="removed"><del><strong>contains a key logger that</strong></del></span> 
<span class="inserted"><ins><em>is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL typed in&lt;/a&gt;, one key 
at</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report the sites they visit to advertising and
-    data companies, first of all to Google. Moreover, if users 
have</em></ins></span> a <span class="removed"><del><strong>time.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-    <span class="inserted"><ins><em>Gmail account,</em></ins></span> Chrome 
<span class="removed"><del><strong>includes</strong></del></span> <span 
class="inserted"><ins><em>automatically logs them in to the browser for
+    &lt;p&gt;Google Chrome is an &lt;a
+    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
+    instrument</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade
+    users' computers and report the</em></ins></span> sites <span 
class="inserted"><ins><em>they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
     &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>module</strong></del></span> <span 
class="inserted"><ins><em>modified version of Firefox
-    with several changes to protect users' privacy.&lt;/p&gt;
+    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
+    with several changes</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704131"&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
-    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites report 
all their visitors to Google by using
+      the Google Analytics service, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
-    of transparency on the part of both the educational services and the
-    schools, the difficulty of opting out of these services, and the lack
-    of proper privacy policies, among other things.&lt;/p&gt;
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>lack
+    of transparency on the part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
+      user's list</strong></del></span>
+    <span class="inserted"><ins><em>schools, the difficulty</em></ins></span> 
of <span class="removed"><del><strong>other people's phone numbers or email 
addresses).
+      This violates</strong></del></span> <span 
class="inserted"><ins><em>opting out of these services, and</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
+    of <span class="removed"><del><strong>those</strong></del></span> <span 
class="inserted"><ins><em>proper privacy policies, among</em></ins></span> 
other <span class="removed"><del><strong>people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
 
     &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize</em></ins></span> that <span class="inserted"><ins><em>the 
software Google uses to spy on students is
+    should realize that</em></ins></span> the <span 
class="removed"><del><strong>NSA to directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software Google uses</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span> <span class="inserted"><ins><em>students is
     nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt; for both 
education</em></ins></span> and <span class="removed"><del><strong>transmits 
audio</strong></del></span> <span class="inserted"><ins><em>school
+    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL typed in&lt;/a&gt;, one 
key</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
     administration. If the school is run locally, parents and teachers
-    can mandate their representatives at the School Board</em></ins></span> to 
<span class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>refuse the
-    budget unless the school initiates a switch to free software. If
+    can mandate their representatives</em></ins></span> at <span 
class="inserted"><ins><em>the School Board to refuse the
+    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
+      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones and transmits audio</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software. If
     education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
     etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
@@ -3509,20 +3549,13 @@
       <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
       proprietary software</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people</em></ins></span> to <span class="removed"><del><strong>make sure 
they can't &ldquo;fool&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>give their phone number&lt;/a&gt; in order to create 
an account on</em></ins></span>
-    the 
-      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>company's network. On top of mistreating their 
users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;</em></ins></span>
+    people to give their phone number&lt;/a&gt; in order</em></ins></span> to 
<span class="removed"><del><strong>make sure they can't &ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902040"&gt;
-    &lt;p&gt;Google invites people</em></ins></span> to <span 
class="removed"><del><strong>listen for speech</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
-    let Google monitor their phone use, and</em></ins></span> all <span 
class="removed"><del><strong>the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will</strong></del></span> be able to <span 
class="removed"><del><strong>listen for speech all</strong></del></span> <span 
class="inserted"><ins><em>create an account on</em></ins></span>
+    the <span class="removed"><del><strong>time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3534,8 +3567,16 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
-      potential</strong></del></span> <span class="inserted"><ins><em>internet 
use in their
+  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, 
creates</strong></del></span> <span class="inserted"><ins><em>company's 
network. On top of mistreating their users by providing
+    nonfree software, Microsoft is tracking their lives 
outside</em></ins></span> the
+      <span class="removed"><del><strong>potential</strong></del></span> <span 
class="inserted"><ins><em>computer and
+    violates their privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902040"&gt;
+    &lt;p&gt;Google invites people to &lt;a
+    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
+    let Google monitor their phone use, and all internet use in their
     homes,</em></ins></span> for <span class="inserted"><ins><em>an 
extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is not a malicious functionality of a program with some other
@@ -3631,7 +3672,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:00 $
+$Date: 2020/11/16 16:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.365
retrieving revision 1.366
diff -u -b -r1.365 -r1.366
--- proprietary-surveillance.it.po      14 Nov 2020 09:33:00 -0000      1.365
+++ proprietary-surveillance.it.po      16 Nov 2020 16:04:00 -0000      1.366
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5293,9 +5293,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary-surveillance.ja-diff.html       14 Nov 2020 09:33:00 -0000      
1.223
+++ proprietary-surveillance.ja-diff.html       16 Nov 2020 16:04:00 -0000      
1.224
@@ -1704,21 +1704,15 @@
     and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves</em></ins></span>
     that <span class="removed"><del><strong>they are nearby.  Once your
       Internet devices</strong></del></span> <span 
class="inserted"><ins><em>the policies of a development 
platform</em></ins></span> are <span class="removed"><del><strong>paired with 
your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
     preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>surveillance feature for</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in 
interacting</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and</strong></del></span> <span class="inserted"><ins><em>the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
@@ -2965,8 +2959,8 @@
     sneaking it into the contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to 
you,</em></ins></span>
-    watching <span class="inserted"><ins><em>you, following your movements, 
tracking passengers' cell
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
@@ -3131,25 +3125,29 @@
     &lt;p&gt;Many web sites report all their visitors
     to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>page that was 
visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
-    &lt;p&gt;Many web sites try to collect</em></ins></span> users' <span 
class="removed"><del><strong>voice on</strong></del></span> <span 
class="inserted"><ins><em>address books (the user's list
-    of other people's phone numbers or email addresses).  This 
violates</em></ins></span>
-    the <span class="removed"><del><strong>internet</strong></del></span> 
<span class="inserted"><ins><em>privacy of those other people.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201110040"&gt;
-    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
-    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would 
then</strong></del></span> <span class="inserted"><ins><em>track visitors to 
those pages&lt;/a&gt;&mdash;even users
-    that don't</em></ins></span> have <span class="inserted"><ins><em>Facebook 
accounts.&lt;/p&gt;
+  &lt;li id="M201200000"&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those</em></ins></span> other <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3159,11 +3157,12 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
-    &lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>give it</strong></del></span> <span 
class="inserted"><ins><em>snoop on information that users have typed into a
-    form but not sent&lt;/a&gt;, in order</em></ins></span> to <span 
class="removed"><del><strong>the US or</strong></del></span> <span 
class="inserted"><ins><em>learn their identity. Some are &lt;a
+    &lt;p&gt;Many web sites use JavaScript code</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and would 
then</strong></del></span> <span class="inserted"><ins><em>snoop on information 
that users</em></ins></span> have <span class="inserted"><ins><em>typed into a
+    form but not sent&lt;/a&gt;, in order</em></ins></span> to
+      <span class="removed"><del><strong>give it to the US 
or</strong></del></span> <span class="inserted"><ins><em>learn their identity. 
Some are &lt;a
     
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
@@ -3212,7 +3211,7 @@
     code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -3223,7 +3222,7 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
-    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
     &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>identify users.&lt;/p&gt;
   &lt;/li&gt;
@@ -3289,27 +3288,26 @@
 &lt;!-- #SpywareOnTheWeb --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
-    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
-    collecting far more data</em></ins></span> on <span 
class="inserted"><ins><em>students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>Web&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy</strong></del></span> <span 
class="inserted"><ins><em>lack
-    of transparency</em></ins></span> on <span 
class="removed"><del><strong>their visitors.  Web sites are not
-   programs, so it
-   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web 
sites</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools</em></ins></span> are <span 
class="removed"><del><strong>not
+   programs, so it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but</strong></del></span> the <span 
class="removed"><del><strong>surveillance is an abuse all</strong></del></span> 
<span class="inserted"><ins><em>part of both</em></ins></span> the <span 
class="removed"><del><strong>same.&lt;/p&gt;
+   but the surveillance</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than</em></ins></span> is <span 
class="removed"><del><strong>an abuse all</strong></del></span> <span 
class="inserted"><ins><em>necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>same.&lt;/p&gt;
 
 &lt;ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>educational services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
+    of transparency on the part of both the educational 
services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
     schools, the difficulty</em></ins></span> of <span 
class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
       businesses to show different people different prices&lt;/a&gt;. 
Most</strong></del></span> <span class="inserted"><ins><em>opting 
out</em></ins></span> of <span class="inserted"><ins><em>these services, 
and</em></ins></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
     of proper privacy policies, among other things.&lt;/p&gt;
@@ -3434,20 +3432,13 @@
       <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
       proprietary software</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people</em></ins></span> to <span class="removed"><del><strong>make sure 
they can't &ldquo;fool&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>give their phone number&lt;/a&gt; in order to create 
an account on</em></ins></span>
-    the 
-      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>company's network. On top of mistreating their 
users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;</em></ins></span>
+    people to give their phone number&lt;/a&gt; in order</em></ins></span> to 
<span class="removed"><del><strong>make sure they can't &ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902040"&gt;
-    &lt;p&gt;Google invites people</em></ins></span> to <span 
class="removed"><del><strong>listen for speech</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
-    let Google monitor their phone use, and</em></ins></span> all <span 
class="removed"><del><strong>the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will</strong></del></span> be able to <span 
class="removed"><del><strong>listen for speech all</strong></del></span> <span 
class="inserted"><ins><em>create an account on</em></ins></span>
+    the <span class="removed"><del><strong>time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3459,8 +3450,16 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
-      potential</strong></del></span> <span class="inserted"><ins><em>internet 
use in their
+  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, 
creates</strong></del></span> <span class="inserted"><ins><em>company's 
network. On top of mistreating their users by providing
+    nonfree software, Microsoft is tracking their lives 
outside</em></ins></span> the
+      <span class="removed"><del><strong>potential</strong></del></span> <span 
class="inserted"><ins><em>computer and
+    violates their privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902040"&gt;
+    &lt;p&gt;Google invites people to &lt;a
+    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
+    let Google monitor their phone use, and all internet use in their
     homes,</em></ins></span> for <span class="inserted"><ins><em>an 
extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is not a malicious functionality of a program with some other
@@ -3556,7 +3555,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:00 $
+$Date: 2020/11/16 16:04:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary-surveillance.ja.po      14 Nov 2020 09:33:01 -0000      1.347
+++ proprietary-surveillance.ja.po      16 Nov 2020 16:04:01 -0000      1.348
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4208,9 +4208,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary-surveillance.pot        14 Nov 2020 09:33:01 -0000      1.286
+++ proprietary-surveillance.pot        16 Nov 2020 16:04:01 -0000      1.287
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3403,10 +3403,10 @@
 msgid ""
 "Microsoft <a "
 
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
 "
-"people to give their phone number</a> in order to create an account on the "
-"company's network. On top of mistreating their users by providing nonfree "
-"software, Microsoft is imposing surveillance on people and violating their "
-"privacy."
+"people to give their phone number</a> in order to be able to create an "
+"account on the company's network. On top of mistreating their users by "
+"providing nonfree software, Microsoft is tracking their lives outside the "
+"computer and violates their privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.644
retrieving revision 1.645
diff -u -b -r1.644 -r1.645
--- proprietary-surveillance.ru.po      14 Nov 2020 09:33:01 -0000      1.644
+++ proprietary-surveillance.ru.po      16 Nov 2020 16:04:01 -0000      1.645
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -5023,9 +5023,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary.de-diff.html    14 Nov 2020 09:33:01 -0000      1.189
+++ proprietary.de-diff.html    16 Nov 2020 16:04:02 -0000      1.190
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -224,10 +224,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006120"&gt;
@@ -329,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.de.po   14 Nov 2020 09:33:01 -0000      1.229
+++ proprietary.de.po   16 Nov 2020 16:04:03 -0000      1.230
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -477,9 +477,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary.es.po   15 Nov 2020 10:46:30 -0000      1.339
+++ proprietary.es.po   16 Nov 2020 16:04:03 -0000      1.340
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -333,13 +334,29 @@
 "las llamadas de emergencia y el acceso a la configuración del aparato."
 
 #. type: Content of: <div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary.fr.po   14 Nov 2020 10:29:13 -0000      1.382
+++ proprietary.fr.po   16 Nov 2020 16:04:03 -0000      1.383
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-11-14 11:25+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -329,13 +330,29 @@
 "d'urgence et l'accès aux réglages."
 
 #. type: Content of: <div><ul><li><p>
+# | Microsoft <a
+# | 
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.it-diff.html    14 Nov 2020 09:33:01 -0000      1.201
+++ proprietary.it-diff.html    16 Nov 2020 16:04:03 -0000      1.202
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -223,10 +223,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006120"&gt;
@@ -328,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary.it.po   14 Nov 2020 09:33:01 -0000      1.238
+++ proprietary.it.po   16 Nov 2020 16:04:03 -0000      1.239
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -482,9 +482,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.ja-diff.html    14 Nov 2020 09:33:01 -0000      1.206
+++ proprietary.ja-diff.html    16 Nov 2020 16:04:03 -0000      1.207
@@ -56,14 +56,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -161,9 +161,9 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
@@ -222,10 +222,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006120"&gt;
@@ -327,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- proprietary.ja.po   14 Nov 2020 09:33:01 -0000      1.222
+++ proprietary.ja.po   16 Nov 2020 16:04:03 -0000      1.223
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -340,9 +340,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.nl-diff.html    14 Nov 2020 09:33:01 -0000      1.202
+++ proprietary.nl-diff.html    16 Nov 2020 16:04:03 -0000      1.203
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -127,17 +127,17 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -223,10 +223,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006120"&gt;
@@ -328,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.nl.po   14 Nov 2020 09:33:01 -0000      1.212
+++ proprietary.nl.po   16 Nov 2020 16:04:03 -0000      1.213
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -385,9 +385,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary.pl-diff.html    14 Nov 2020 09:33:01 -0000      1.219
+++ proprietary.pl-diff.html    16 Nov 2020 16:04:03 -0000      1.220
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -157,12 +157,12 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -222,10 +222,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006120"&gt;
@@ -327,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.pl.po   14 Nov 2020 09:33:01 -0000      1.205
+++ proprietary.pl.po   16 Nov 2020 16:04:03 -0000      1.206
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -566,9 +566,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.pot     14 Nov 2020 09:33:01 -0000      1.202
+++ proprietary.pot     16 Nov 2020 16:04:03 -0000      1.203
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -274,10 +274,10 @@
 msgid ""
 "Microsoft <a "
 
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
 "
-"people to give their phone number</a> in order to create an account on the "
-"company's network. On top of mistreating their users by providing nonfree "
-"software, Microsoft is imposing surveillance on people and violating their "
-"privacy."
+"people to give their phone number</a> in order to be able to create an "
+"account on the company's network. On top of mistreating their users by "
+"providing nonfree software, Microsoft is tracking their lives outside the "
+"computer and violates their privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary.pt-br-diff.html 14 Nov 2020 09:33:01 -0000      1.11
+++ proprietary.pt-br-diff.html 16 Nov 2020 16:04:03 -0000      1.12
@@ -206,7 +206,7 @@
     coerce workers into installing in</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
     people to give</em></ins></span> their <span 
class="removed"><del><strong>own computers&lt;/a&gt;, so the
-    bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone 
number&lt;/a&gt; in order to create an account</em></ins></span> on <span 
class="removed"><del><strong>them.&lt;/p&gt;
+    bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone 
number&lt;/a&gt; in order to be able to create an account</em></ins></span> on 
<span class="removed"><del><strong>them.&lt;/p&gt;
 
     &lt;p&gt;This shows why requiring</strong></del></span>
     the <span class="removed"><del><strong>user's 
&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>company's network. On top of mistreating their users 
by providing
@@ -214,8 +214,8 @@
     an adequate basis for protecting digital privacy.  The boss can coerce
     most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal</strong></del></span> <span class="inserted"><ins><em>imposing 
surveillance on people</em></ins></span> and <span 
class="removed"><del><strong>bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>violating their 
privacy.&lt;/p&gt;</em></ins></span>
+    be illegal</strong></del></span> <span class="inserted"><ins><em>tracking 
their lives outside the computer</em></ins></span> and <span 
class="removed"><del><strong>bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>violates their 
privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="M201504210"&gt;
@@ -341,7 +341,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary.pt-br.po        14 Nov 2020 09:33:01 -0000      1.337
+++ proprietary.pt-br.po        16 Nov 2020 16:04:03 -0000      1.338
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -330,9 +330,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- proprietary.ru.po   14 Nov 2020 09:33:01 -0000      1.416
+++ proprietary.ru.po   16 Nov 2020 16:04:03 -0000      1.417
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -340,9 +340,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary.tr.po   14 Nov 2020 13:40:21 -0000      1.75
+++ proprietary.tr.po   16 Nov 2020 16:04:03 -0000      1.76
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-11-14 14:39+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.1\n"
 
@@ -327,13 +328,22 @@
 "bir şey için kullanılamıyor."
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft, şirketin ağında bir hesap açmak isteyen <a 
href=\"https://answers.";
 "microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-"

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.zh-cn.po        16 Nov 2020 05:59:34 -0000      1.85
+++ proprietary.zh-cn.po        16 Nov 2020 16:04:04 -0000      1.86
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-11-16 13:31+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -306,13 +307,22 @@
 "如紧急呼叫和访问设置。"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.zh-tw-diff.html 14 Nov 2020 09:33:02 -0000      1.182
+++ proprietary.zh-tw-diff.html 16 Nov 2020 16:04:04 -0000      1.183
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -69,9 +70,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -224,10 +224,10 @@
   &lt;li id="M201905281"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order to create an account 
on
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
     the company's network. On top of mistreating their users by providing
-    nonfree software, Microsoft is imposing surveillance on people and
-    violating their privacy.&lt;/p&gt;
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006120"&gt;
@@ -329,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/14 09:33:02 $
+$Date: 2020/11/16 16:04:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary.zh-tw.po        14 Nov 2020 09:33:02 -0000      1.192
+++ proprietary.zh-tw.po        16 Nov 2020 16:04:04 -0000      1.193
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -455,9 +455,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- pt-br.po    14 Nov 2020 09:33:02 -0000      1.296
+++ pt-br.po    16 Nov 2020 16:04:04 -0000      1.297
@@ -5075,9 +5075,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.505
retrieving revision 1.506
diff -u -b -r1.505 -r1.506
--- ru.po       14 Nov 2020 09:33:02 -0000      1.505
+++ ru.po       16 Nov 2020 16:04:04 -0000      1.506
@@ -6252,9 +6252,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- tr.po       14 Nov 2020 14:00:57 -0000      1.80
+++ tr.po       16 Nov 2020 16:04:05 -0000      1.81
@@ -4519,13 +4519,22 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft, şirketin ağında bir hesap açmak isteyen <a 
href=\"https://answers.";
 "microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-"
@@ -9136,6 +9145,22 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft, şirketin ağında bir hesap açmak isteyen <a href=\"https://";
+#~ "answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-"
+#~ "account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">insanları telefon "
+#~ "numaralarını vermeye zorluyor</a>. Microsoft, özgür olmayan yazılım "
+#~ "sağlayarak kullanıcılara kötü davrandığı gibi, insanlara gözetim "
+#~ "dayatıyor ve gizliliklerini ihlal ediyor."
+
 #, fuzzy
 #~| msgid ""
 #~| "As of August, 2020, the pages in this directory list around 450 "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- zh-cn.po    16 Nov 2020 05:59:34 -0000      1.76
+++ zh-cn.po    16 Nov 2020 16:04:05 -0000      1.77
@@ -4440,13 +4440,22 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
 msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
@@ -8931,6 +8940,20 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
 
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">强制人们提供电话号ç 
</a> 来"
+#~ 
"创建微软网络账号。微软除了通过提供非自由软件来伤害用户之外,又强åŠ
 å¯¹ç”¨æˆ·çš„"
+#~ "监控并侵犯个人隐私。"
+
 #, fuzzy
 #~| msgid ""
 #~| "As of August, 2020, the pages in this directory list around 450 "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- zh-tw.po    14 Nov 2020 09:33:02 -0000      1.232
+++ zh-tw.po    16 Nov 2020 16:04:05 -0000      1.233
@@ -4433,9 +4433,10 @@
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]