www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 19 Nov 2020 05:31:34 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/19 05:31:33

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-in-online-conferencing.es.po 
                         malware-in-online-conferencing.fr.po 
                         malware-in-online-conferencing.pot nl.po pl.po 
                         pot proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.411&r2=1.412
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.fr.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.pot?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.354&r2=1.355
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.560&r2=1.561
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.366&r2=1.367
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.348&r2=1.349
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.646&r2=1.647
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.418&r2=1.419
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.508&r2=1.509
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.233&r2=1.234

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- de.po       16 Nov 2020 16:03:56 -0000      1.233
+++ de.po       19 Nov 2020 10:31:30 -0000      1.234
@@ -6638,6 +6638,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | Copyright &copy; [-2016-] {+2020+} Free Software Foundation, Inc.
 #, fuzzy

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- es.po       16 Nov 2020 16:03:57 -0000      1.333
+++ es.po       19 Nov 2020 10:31:30 -0000      1.334
@@ -6487,6 +6487,16 @@
 "BigBlueButton, y mejor aún si se instalan en un servidor controlado por los "
 "propios usuarios."
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | Copyright &copy; [-2014-] {+2020+} Free Software Foundation, Inc.
 #, fuzzy

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.411
retrieving revision 1.412
diff -u -b -r1.411 -r1.412
--- fr.po       17 Nov 2020 11:18:47 -0000      1.411
+++ fr.po       19 Nov 2020 10:31:30 -0000      1.412
@@ -5667,6 +5667,16 @@
 "directory.fsf.org/wiki/Jitsi\">Jitsi</a> ou BigBlueButton, et c'est encore "
 "mieux s'ils sont installés sur un serveur contrôlé par ses utilisateurs."
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid "Copyright &copy; 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2020 Free Software Foundation, Inc."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- it.po       16 Nov 2020 16:03:58 -0000      1.233
+++ it.po       19 Nov 2020 10:31:30 -0000      1.234
@@ -6204,6 +6204,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | Copyright &copy; [-2015-] {+2020+} Free Software Foundation, Inc.
 #, fuzzy

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- ja.po       16 Nov 2020 16:03:58 -0000      1.241
+++ ja.po       19 Nov 2020 10:31:30 -0000      1.242
@@ -4827,6 +4827,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."

Index: malware-in-online-conferencing.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-in-online-conferencing.es.po        11 Nov 2020 10:09:03 -0000      
1.4
+++ malware-in-online-conferencing.es.po        19 Nov 2020 10:31:30 -0000      
1.5
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-in-online-conferencing.html\n"
-"POT-Creation-Date: 2020-11-10 15:55+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-11 10:34+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -138,6 +139,16 @@
 "BigBlueButton, y mejor aún si se instalan en un servidor controlado por los "
 "propios usuarios."
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div><div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: malware-in-online-conferencing.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.fr.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-in-online-conferencing.fr.po        11 Nov 2020 13:18:49 -0000      
1.2
+++ malware-in-online-conferencing.fr.po        19 Nov 2020 10:31:30 -0000      
1.3
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-in-online-conferencing.html\n"
-"POT-Creation-Date: 2020-11-10 15:55+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-11 13:32+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
@@ -131,6 +132,16 @@
 "directory.fsf.org/wiki/Jitsi\">Jitsi</a> ou BigBlueButton, et c'est encore "
 "mieux s'ils sont installés sur un serveur contrôlé par ses utilisateurs."
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div><div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: malware-in-online-conferencing.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.pot,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-in-online-conferencing.pot  10 Nov 2020 16:02:01 -0000      1.3
+++ malware-in-online-conferencing.pot  19 Nov 2020 10:31:30 -0000      1.4
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-in-online-conferencing.html\n"
-"POT-Creation-Date: 2020-11-10 15:55+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -104,6 +104,16 @@
 "users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\";>is
 "
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div><div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- nl.po       16 Nov 2020 16:03:59 -0000      1.234
+++ nl.po       19 Nov 2020 10:31:30 -0000      1.235
@@ -4476,6 +4476,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | Copyright &copy; [-2015, 2016-] {+2020+} Free Software Foundation, Inc.
 #, fuzzy

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- pl.po       16 Nov 2020 16:03:59 -0000      1.233
+++ pl.po       19 Nov 2020 10:31:30 -0000      1.234
@@ -4001,6 +4001,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | Copyright &copy; [-2013, 2014, 2015-] {+2020+} Free Software Foundation,
 # | Inc.

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- pot 16 Nov 2020 16:03:59 -0000      1.232
+++ pot 19 Nov 2020 10:31:30 -0000      1.233
@@ -3755,6 +3755,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid "Copyright &copy; 2020 Free Software Foundation, Inc."
 msgstr ""

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary-surveillance.de-diff.html       16 Nov 2020 16:03:59 -0000      
1.140
+++ proprietary-surveillance.de-diff.html       19 Nov 2020 10:31:30 -0000      
1.141
@@ -1352,411 +1352,474 @@
   &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202003010"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Alipay Health Code</em></ins></span> app
-    <span class="inserted"><ins><em>estimates whether the user has 
Covid-19</em></ins></span> and <span class="removed"><del><strong>dis-service 
spy on users even more than users
-      expected. It</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going to a movie&lt;/a&gt;.
+  &lt;li id="M202003260"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>moviepass app and 
dis-service spy on users even more than users
+      expected. It</strong></del></span> <span class="inserted"><ins><em>Apple 
iOS version of Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if the user doesn't 
have</em></ins></span>
+    a <span class="removed"><del><strong>movie&lt;/a&gt;.
     &lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
Sarahah</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging</em></ins></span> app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note</strong></del></span> that <span 
class="inserted"><ins><em>is a good
-    reason to use free software instead.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;&lt;small&gt;Note:</em></ins></span> this article <span 
class="removed"><del><strong>misuses</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>words
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span> <span class="inserted"><ins><em>Facebook 
account. According</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note that this article 
misuses</strong></del></span> the <span class="removed"><del><strong>words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
+      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in</em></ins></span>
-    the <span class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Facebook's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202003010"&gt;
+    &lt;p&gt;The Alipay Health Code</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span>
+    <span class="inserted"><ins><em>estimates whether</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>user has Covid-19 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
     on what people are listening to or watching&lt;/a&gt;. In addition, it may
     be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
        &lt;/li&gt;
 
   &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots</strong></del></span> <span 
class="inserted"><ins><em>sense</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+               how much access it demands to personal data 
in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on <span class="removed"><del><strong>some of 
its phones. The app will give Verizon</strong></del></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand to do this.  
For</em></ins></span> the <span class="removed"><del><strong>users' searches 
that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span>
-    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring</em></ins></span> app <span 
class="removed"><del><strong>that it will&lt;/a&gt;
+        pre-install on some of its phones. The</strong></del></span> <span 
class="inserted"><ins><em>does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>phone's 
microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>Android version was found to contain a
-    back-door allowing developers to run any code they wish 
in</em></ins></span> the <span class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="removed"><del><strong>remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;li id="M201912220"&gt;
+    &lt;p&gt;The ToToc messaging</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>seems to be a &lt;a
+    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they</strong></del></span> <span class="inserted"><ins><em>is a good
+    reason to</em></ins></span> use <span class="removed"><del><strong>its 
search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>free software instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span> <span class="inserted"><ins><em>mandatory at some 
workplaces.&lt;/p&gt;
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping</em></ins></span> and <span class="inserted"><ins><em>sabotage 
capabilities&lt;/a&gt; if they install their own
+    software on</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand to do this.  
For</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span>
+    <span class="inserted"><ins><em>employee, this</em></ins></span> is
+    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>simply 
nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu 
photo-editing</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes 
a clarification
-    saying that the tests were</em></ins></span> only
-  <span class="removed"><del><strong>can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>performed</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>the Android version</em></ins></span>
-    of <span class="removed"><del><strong>data in</strong></del></span> the 
<span class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish</em></ins></span> in the <span 
class="inserted"><ins><em>users'</em></ins></span>
+    phone, <span class="inserted"><ins><em>as &ldquo;superusers.&rdquo; 
Downloading</em></ins></span> and <span class="removed"><del><strong>in server 
accounts, it can
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>using this</em></ins></span>
+    app <span class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>is mandatory at some workplaces.&lt;/p&gt;
 
-  &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;,</em></ins></span> after 
<span class="inserted"><ins><em>tricking them
-    into giving</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> app 
<span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
+    saying</em></ins></span> that <span class="removed"><del><strong>include 
       &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>the tests were only performed</em></ins></span> on 
<span class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>the Android version
+    of the app,</em></ins></span> and <span class="removed"><del><strong>TV 
programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>that, according to 
Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span> on <span class="removed"><del><strong>various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>Apple's operating 
system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>Maya</em></ins></span> &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook</em></ins></span> app &lt;a
 <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
 scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share the picture you take 
according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+      and suggests you to share the picture you take according to 
who</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it</em></ins></span> is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>turned 
off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to 
<span class="removed"><del><strong>Facebook's servers</strong></del></span> 
<span class="inserted"><ins><em>use one of its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of</em></ins></span> who <span 
class="inserted"><ins><em>downloads a proprietary
-    program</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+  &lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>list of all</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> users' <span 
class="removed"><del><strong>pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span 
class="inserted"><ins><em>lives</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
+    &lt;p&gt;Keeping track of who downloads a</em></ins></span> proprietary 
<span class="removed"><del><strong>malware (DRM and snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize that it</strong></del></span>
+    <span class="inserted"><ins><em>program</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span> a <span 
class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>form of surveillance.  There</em></ins></span> is a 
<span class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
+    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>program</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
+    apps</strong></del></span> <span class="inserted"><ins><em>adjusting a 
certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not</em></ins></span> be
-      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has 
installed
+    &lt;p&gt;With a free program there would not be a list of 
who</em></ins></span> has
+    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
-    of <span class="removed"><del><strong>Facebook users' pictures 
are</strong></del></span> <span class="inserted"><ins><em>the operating system, 
in order to gather as much</em></ins></span> private
-      <span class="removed"><del><strong>anymore,</strong></del></span> <span 
class="inserted"><ins><em>data as
-    they possibly can.&lt;/p&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing 
features
+    of the operating system, in order to gather</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>much private data</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span>
+    <span class="inserted"><ins><em>they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907080"&gt;
-    &lt;p&gt;Many Android apps can track
-    users' movements</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+    &lt;p&gt;Many Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>can track
+    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>secretly a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too,</em></ins></span> as <span 
class="inserted"><ins><em>you must expect from nonfree
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> proprietary <span 
class="removed"><del><strong>apps for mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>phone 
app&lt;/a&gt; to be allowed into</em></ins></span>
-    the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>event.&lt;/p&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>event.&lt;/p&gt;
 
-    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>at least is visible</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
-    sensitive data, including user's location</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
+    &lt;p&gt;This app</em></ins></span> is <span 
class="removed"><del><strong>in addition to</strong></del></span> <span 
class="inserted"><ins><em>a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>snooping done</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy 
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on 
the user&lt;/a&gt;. This</strong></del></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>often &lt;a
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>the phone company,</strong></del></span> <span 
class="inserted"><ins><em>menstrual</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
       <span class="removed"><del><strong>phone.&lt;/p&gt;
 
       &lt;p&gt;Don't</strong></del></span>
     <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
     <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+      users</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to
+      <span class="removed"><del><strong>approve</strong></del></span> <span 
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span 
class="removed"><del><strong>personal</strong></del></span>
+    <span class="inserted"><ins><em>the location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>women's 
rights</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>equal employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>the 
app developer but did not
-      ask about sending it to other companies.  This shows the
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="inserted"><ins><em>on</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
       weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
-    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have 
access</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should a flashlight
+      app send any information</strong></del></span>
+    <span class="inserted"><ins><em>the network but no direct 
access</em></ins></span> to <span class="removed"><del><strong>anyone?  A free 
software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the data. This results</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of</strong></del></span> <span class="inserted"><ins><em>that does 
more or less</em></ins></span> the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend 
Cayla</strong></del></span> <span class="inserted"><ins><em>same thing without
-    spying on you is available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>i-Que transmit</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>speech recognition company 
based</strong></del></span> <span class="inserted"><ins><em>new one is being 
developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201903201"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="removed"><del><strong>remote-control sex toy 
was</strong></del></span> <span class="inserted"><ins><em>study of 24 
&ldquo;health&rdquo; apps</em></ins></span> found <span 
class="removed"><del><strong>to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>that 
19</em></ins></span> of <span class="removed"><del><strong>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span 
class="inserted"><ins><em>them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which</em></ins></span> can <span 
class="removed"><del><strong>remotely control the toys with a mobile phone. 
This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>use it
+    for invasive advertising or discriminating against 
people</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>poor
+    medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible for 
sending</em></ins></span>
-    the <span class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>location data to Google.&lt;/p&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come</em></ins></span> with a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This 
results</em></ins></span> in <span class="inserted"><ins><em>massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>a 
child's speech, and even speak
-      into</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, 
not</em></ins></span> even <span class="removed"><del><strong>speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>computerized vibrator
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator
       &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     
-    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
       body), as well as the vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
       standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
+      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps</em></ins></span> have
+      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>19</em></ins></span> of <span 
class="inserted"><ins><em>them &lt;a
-    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive</em></ins></span> personal <span 
class="removed"><del><strong>information about how
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was anonymizing 
the</strong></del></span> data <span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;, which can use</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
-    medical condition.&lt;/p&gt;
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>data may be
+      true,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
+    difficult.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>had sold the data</strong></del></span> 
<span class="inserted"><ins><em>is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient</em></ins></span> to <span 
class="inserted"><ins><em>legitimize snooping.&lt;/p&gt;
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet,</em></ins></span> but <span class="removed"><del><strong>it 
doesn't</strong></del></span> <span class="inserted"><ins><em>they should also 
stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they</em></ins></span> really <span 
class="removed"><del><strong>matter. If it had sold</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt;. Lots of companies built apps 
that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="inserted"><ins><em>personal</em></ins></span>
-    data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>they collected</em></ins></span> would <span 
class="removed"><del><strong>have been able to figure out
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used</em></ins></span> to <span 
class="inserted"><ins><em>spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover,</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>data broker 
would</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps</em></ins></span> have <span class="removed"><del><strong>been able to 
figure out
       who the user was.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even the
-    developers</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to</em></ins></span> the <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The</em></ins></span> 
company <span class="removed"><del><strong>has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>is
+    being sued, demanding that it notify the users</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys</strong></del></span> <span 
class="inserted"><ins><em>what it will do</em></ins></span>
+    with <span class="removed"><del><strong>microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way to access</strong></del></span> <span 
class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>data 
is a secondary issue. The principal wrong here is that</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>the FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
+  &lt;/li&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span class="removed"><del><strong>children 
and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new items on 
top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the user's actions</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>&ldquo;Smart&rdquo; Watches&lt;/h3&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;
     (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1764,56 +1827,58 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span> 
<span class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users,</em></ins></span> and 
<span class="inserted"><ins><em>redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the 
user</em></ins></span> is <span class="removed"><del><strong>designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>phishing sites</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. Furthermore,
-    the user interface of most of them was designed</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
-    difficult.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with 
an</strong></del></span>
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>back door, 
but</strong></del></span> <span class="inserted"><ins><em>potential risk because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some</em></ins></span> Android <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could
-    <span class="inserted"><ins><em>potentially also</em></ins></span> be 
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
-    found as well.&lt;/p&gt;
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Moreover,</em></ins></span> a
-      <span class="removed"><del><strong>misunderstanding.  However, 
it</strong></del></span> <span class="inserted"><ins><em>previous investigation 
had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door,</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
+    tracking,</em></ins></span> but <span class="removed"><del><strong>that 
could</strong></del></span> <span class="inserted"><ins><em>most users 
will</em></ins></span> be <span class="removed"><del><strong>a
+      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>tricked by the misleading control.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>certainly 
surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>no way to save
+    a recording. But we can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1823,70 +1888,59 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the company's 
server&lt;/a&gt;. The company is
-    being sued, demanding</em></ins></span> that <span 
class="inserted"><ins><em>it notify</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>users 
of what it will do
-    with the data.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;We think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>side issue. What 
the company does
-    with the data</em></ins></span> is <span class="removed"><del><strong>not 
really
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span class="removed"><del><strong>specific 
sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a secondary issue. The principal wrong here is that
-    the company gets that data</em></ins></span> at <span 
class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
-  &lt;/li&gt;
-
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>emails 
of members of Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can</strong></del></span> <span 
class="inserted"><ins><em>snoop
+    and</em></ins></span> collect <span class="removed"><del><strong>the 
emails</strong></del></span> <span class="inserted"><ins><em>information about 
its users&lt;/a&gt;.  40%</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>snooping, in these proprietary apps whose
+    source code</em></ins></span> they <span class="removed"><del><strong>pass 
it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span> <span 
class="inserted"><ins><em>send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>cannot look at.  The other apps might be 
snooping</em></ins></span>
+    in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1895,77 +1949,46 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be sure from the article.&lt;/p&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the 
information</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info 
to</em></ins></span> each <span class="removed"><del><strong>subsection 
--&gt;</strong></del></span>
-    <span class="inserted"><ins><em>other but not to the server's 
database.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information 
about</em></ins></span> its <span class="removed"><del><strong>manufacturer 
can</strong></del></span> <span class="inserted"><ins><em>users.
+    It could be designed so that users</em></ins></span> communicate <span 
class="inserted"><ins><em>such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
@@ -2747,7 +2770,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>it,</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
@@ -2775,11 +2798,10 @@
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2815,58 +2837,46 @@
     update to its speaker devices using their back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm is happening. This means the devices now listen for more
+    that an alarm</em></ins></span> is <span class="removed"><del><strong>a 
surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
-    out prematurely and</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>accident and Google was planning on disclosing
+    out prematurely and on accident and Google was planning on disclosing
     this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its 
manufacturer</strong></del></span> <span class="inserted"><ins><em>their own 
computers&lt;/a&gt;, so the
-    bosses</em></ins></span> can <span 
class="removed"><del><strong>communicate with it,</strong></del></span> <span 
class="inserted"><ins><em>spy on them.&lt;/p&gt;
-
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span class="inserted"><ins><em>not
-    an adequate basis for protecting digital privacy.  The boss can coerce
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span 
class="inserted"><ins><em>not</em></ins></span>
+    an <span class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing</strong></del></span> <span 
class="inserted"><ins><em>adequate basis for protecting digital privacy.  The 
boss can coerce
     most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
     be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
-    a <span class="inserted"><ins><em>security vulnerability that enabled 
attackers to &lt;a
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
     access the user's wifi password&lt;/a&gt;, and snoop on the household
-    through connected</em></ins></span> surveillance <span 
class="removed"><del><strong>device.</strong></del></span> <span 
class="inserted"><ins><em>devices.&lt;/p&gt;
+    through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used by their
+    software lack this. Of course, they are also used</em></ins></span> by 
<span class="inserted"><ins><em>their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
@@ -3889,7 +3899,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:03:59 $
+$Date: 2020/11/19 10:31:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.354
retrieving revision 1.355
diff -u -b -r1.354 -r1.355
--- proprietary-surveillance.de.po      16 Nov 2020 16:03:59 -0000      1.354
+++ proprietary-surveillance.de.po      19 Nov 2020 10:31:30 -0000      1.355
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -2153,6 +2153,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 "surveillance.html\"> tells the cops directly</a>."

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-surveillance.es.po      17 Nov 2020 10:00:04 -0000      1.102
+++ proprietary-surveillance.es.po      19 Nov 2020 10:31:31 -0000      1.103
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-17 10:49+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -1673,6 +1674,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 "surveillance.html\"> tells the cops directly</a>."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.560
retrieving revision 1.561
diff -u -b -r1.560 -r1.561
--- proprietary-surveillance.fr.po      17 Nov 2020 11:18:48 -0000      1.560
+++ proprietary-surveillance.fr.po      19 Nov 2020 10:31:31 -0000      1.561
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-17 12:18+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1668,6 +1669,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 "surveillance.html\"> tells the cops directly</a>."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary-surveillance.it-diff.html       16 Nov 2020 16:04:00 -0000      
1.206
+++ proprietary-surveillance.it-diff.html       19 Nov 2020 10:31:31 -0000      
1.207
@@ -1040,6 +1040,16 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
     estimates whether the user has Covid-19 and &lt;a
@@ -3672,7 +3682,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:00 $
+$Date: 2020/11/19 10:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.366
retrieving revision 1.367
diff -u -b -r1.366 -r1.367
--- proprietary-surveillance.it.po      16 Nov 2020 16:04:00 -0000      1.366
+++ proprietary-surveillance.it.po      19 Nov 2020 10:31:31 -0000      1.367
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -2067,6 +2067,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 "surveillance.html\"> tells the cops directly</a>."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- proprietary-surveillance.ja-diff.html       16 Nov 2020 16:04:00 -0000      
1.224
+++ proprietary-surveillance.ja-diff.html       19 Nov 2020 10:31:31 -0000      
1.225
@@ -1384,60 +1384,38 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202003010"&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19</em></ins></span> and &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does &lt;a
-    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle:</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
-    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that is a good
-    reason to use free software instead.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span>
-    the
-      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201912090"&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if</em></ins></span> they 
<span class="removed"><del><strong>report even which page</strong></del></span> 
<span class="inserted"><ins><em>install their own
-    software on</em></ins></span> the <span class="removed"><del><strong>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt;</em></ins></span> even <span 
class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> the user <span 
class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>Great Nation&rdquo; app requires 
users</em></ins></span> to <span class="removed"><del><strong>Adobe&lt;/a&gt;.  
Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>grant it 
&lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M202003010"&gt;
+    &lt;p&gt;The Alipay Health Code app
+    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>user has Covid-19 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
@@ -1445,97 +1423,146 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
+    &lt;p&gt;The ToToc messaging app seems to be</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
-    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>mandatory at some workplaces.&lt;/p&gt;
+    &lt;p&gt;That's easy to do because</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>doing this, and</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>is a 
good
+    reason to use free</em></ins></span> software <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in
+    the <span class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span class="inserted"><ins><em>sense 
of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+  &lt;li id="M201912090"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed on</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Android version
-    of</em></ins></span> the <span class="removed"><del><strong>time; it is 
possible</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according</em></ins></span> to <span class="removed"><del><strong>physically 
remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt;</em></ins></span> if <span 
class="removed"><del><strong>no one connects to the car remotely, the cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>they 
install their own
+    software on</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>device.  Many 
employers demand</em></ins></span> to <span class="removed"><del><strong>track 
the car's movements all</strong></del></span> <span 
class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span>
+    <span class="inserted"><ins><em>employee, this</em></ins></span> is <span 
class="removed"><del><strong>possible to physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it</em></ins></span> is <span 
class="removed"><del><strong>made available</strong></del></span> <span 
class="inserted"><ins><em>turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>use one of its
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, 
mentioned</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in <span class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and 
using</em></ins></span> this <span 
class="removed"><del><strong>article,</strong></del></span>
+    <span class="inserted"><ins><em>app</em></ins></span> is <span 
class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in <span 
class="inserted"><ins><em>a text editor) includes a clarification
+    saying that</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>company to extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>Android 
version
+    of</em></ins></span> the <span class="removed"><del><strong>car's location 
at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>app,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>that, according to 
Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909091"&gt;
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>app broad 
permissions in order</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>use one of its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>Maya &lt;a
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program</em></ins></span> is <span class="removed"><del><strong>not
-      really</strong></del></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="removed"><del><strong>proprietary</strong></del></span> surveillance. 
<span class="removed"><del><strong>These systems are an
-      intolerable invasion</strong></del></span>  <span 
class="inserted"><ins><em>There is a
+    program is a form of surveillance.  There is a
     proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>all the 10,000 or more people
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not</em></ins></span> be <span 
class="removed"><del><strong>replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>a list of who has installed
+    &lt;p&gt;With a free program there would not be a list of who has installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
     &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>operating system,</em></ins></span> in <span 
class="inserted"><ins><em>order to gather as much private data as
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
+    of</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to gather as much private 
data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;
+    &lt;p&gt;Thus, we can't trust rules against spying.  What 
we</em></ins></span> can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>trust is
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201907080"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user says &lt;a
+    users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>allow 
them access to locations&lt;/a&gt;.&lt;/p&gt;
+    not</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>allow them access</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
@@ -1547,52 +1574,10 @@
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
-    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's</em></ins></span> location <span 
class="removed"><del><strong>at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-    data <span class="inserted"><ins><em>is 
&ldquo;anonymized</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>aggregated,&rdquo;</em></ins></span> it <span 
class="removed"><del><strong>over, the state</strong></del></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>easily be
-    traced back</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>the woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>spy 
on</strong></del></span> <span class="inserted"><ins><em>equal employment
-    and freedom to make</em></ins></span> their <span 
class="removed"><del><strong>renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1600,111 +1585,133 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>me and
+&lt;p&gt;Emo Phillips made</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>do so. A
-    free-software app</em></ins></span> that <span 
class="removed"><del><strong>was
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>be allowed into</em></ins></span>
+    the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware</em></ins></span> that <span 
class="removed"><del><strong>was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>does more</em></ins></span> or less <span 
class="removed"><del><strong>all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>the same thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>can snoop</em></ins></span> on <span 
class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>a lot</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect 
this</strong></del></span>
+    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and</em></ins></span> has <span 
class="removed"><del><strong>got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
+  &lt;li id="M201904131"&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
+      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>employers and insurance companies&lt;/a&gt;. Even 
though the</em></ins></span>
+    data <span class="removed"><del><strong>are totally inadequate.
+      And what happens</strong></del></span> <span 
class="inserted"><ins><em>is &ldquo;anonymized and aggregated,&rdquo; it can 
easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even</em></ins></span> if <span 
class="inserted"><ins><em>someone offers you</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>do so. A
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>does more or 
less</em></ins></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers 
in</strong></del></span> <span class="inserted"><ins><em>same thing 
without</em></ins></span>
+    spying on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can 
track</strong></del></span> you 
+      <span class="removed"><del><strong>across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It</strong></del></span> is <span 
class="removed"><del><strong>possible to turn this off, but having it enabled 
by default</strong></del></span> <span class="inserted"><ins><em>available from 
&lt;a
     href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    a new one</em></ins></span> is <span class="removed"><del><strong>an 
injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>Android phones and 
iPhones
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone</em></ins></span> has <span 
class="removed"><del><strong>got better.&lt;/p&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>company 
already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> to 
<span class="removed"><del><strong>get users' formal
-      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
-    the location</em></ins></span> data <span class="removed"><del><strong>are 
totally inadequate.
-      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on to user-installed 
apps</em></ins></span> that <span class="removed"><del><strong>TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>have 
access</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span>
-    the <span class="removed"><del><strong>user watches 
&mdash;</strong></del></span> <span class="inserted"><ins><em>network 
but</em></ins></span> no <span 
class="removed"><del><strong>exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>direct 
access to the data. This results</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>massive
-    surveillance</em></ins></span> on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>which the user has 
absolutely no control.&lt;/p&gt;
+    &lt;p&gt;Many Android phones come</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a huge number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call 
home</em></ins></span> with <span class="removed"><del><strong>online 
purchases&lt;/a&gt;, exposing all users</strong></del></span>
+    <span class="inserted"><ins><em>the data, or pass it on</em></ins></span> 
to
+      <span class="removed"><del><strong>new combined</strong></del></span> 
<span class="inserted"><ins><em>user-installed apps that have access to
+    the network but no direct access to the data. This results in 
massive</em></ins></span>
+    surveillance <span class="removed"><del><strong>by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>on which the user 
has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>poor
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>possible to turn this off, but 
having</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>buried 
in
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
     lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>malware running</strong></del></span>
+    <span class="inserted"><ins><em>library for building mobile apps, which 
also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>personal
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives</em></ins></span> information <span 
class="removed"><del><strong>with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    &lt;p&gt;The AppCensus database gives information</em></ins></span> on 
<span class="inserted"><ins><em>&lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt; to</em></ins></span> other <span 
class="removed"><del><strong>devices in
+      range</strong></del></span> <span class="inserted"><ins><em>companies, 
and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>hardware 
identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+    18,000 (23% of the total) link this ID to hardware 
identifiers&lt;/a&gt;,</em></ins></span>
+    so <span class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>that users cannot escape tracking by resetting 
it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves</em></ins></span>
     that <span class="removed"><del><strong>they are nearby.  Once your
       Internet devices</strong></del></span> <span 
class="inserted"><ins><em>the policies of a development 
platform</em></ins></span> are <span class="removed"><del><strong>paired with 
your TV, advertisers can
-      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
+      correlate</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
@@ -1712,7 +1719,7 @@
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in 
interacting</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and</strong></del></span> <span class="inserted"><ins><em>the 
app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
@@ -1720,7 +1727,7 @@
     be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
+    pushing unwanted and often malicious</em></ins></span> ads <span 
class="inserted"><ins><em>on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
@@ -1754,8 +1761,8 @@
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
+    being sued, demanding that it notify the users of what it will 
do</em></ins></span>
+    with <span class="removed"><del><strong>Web 
activity,</strong></del></span> <span class="inserted"><ins><em>the 
data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
@@ -1763,7 +1770,7 @@
 
     &lt;p&gt;&lt;a
     
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="inserted"><ins><em>WeatherBug, are
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
@@ -3555,7 +3562,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:00 $
+$Date: 2020/11/19 10:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.348
retrieving revision 1.349
diff -u -b -r1.348 -r1.349
--- proprietary-surveillance.ja.po      16 Nov 2020 16:04:01 -0000      1.348
+++ proprietary-surveillance.ja.po      19 Nov 2020 10:31:31 -0000      1.349
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1574,6 +1574,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 "surveillance.html\"> tells the cops directly</a>."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary-surveillance.pot        16 Nov 2020 16:04:01 -0000      1.287
+++ proprietary-surveillance.pot        19 Nov 2020 10:31:31 -0000      1.288
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -1165,6 +1165,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\";>is
 "
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html\";>
 "
 "tells the cops directly</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.646
retrieving revision 1.647
diff -u -b -r1.646 -r1.647
--- proprietary-surveillance.ru.po      16 Nov 2020 18:02:21 -0000      1.646
+++ proprietary-surveillance.ru.po      19 Nov 2020 10:31:31 -0000      1.647
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1653,6 +1654,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
 "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-";
 "surveillance.html\"> tells the cops directly</a>."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary.de-diff.html    16 Nov 2020 16:04:02 -0000      1.190
+++ proprietary.de-diff.html    19 Nov 2020 10:31:31 -0000      1.191
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -212,6 +212,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011060"&gt;
     &lt;p&gt;A new app published by Google &lt;a
     
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
@@ -257,15 +267,6 @@
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to be able to install
-    and use the Windows operating system, which is malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:02 $
+$Date: 2020/11/19 10:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.de.po   16 Nov 2020 16:04:03 -0000      1.230
+++ proprietary.de.po   19 Nov 2020 10:31:31 -0000      1.231
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -516,16 +526,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary.es.po   17 Nov 2020 09:51:14 -0000      1.341
+++ proprietary.es.po   19 Nov 2020 10:31:32 -0000      1.342
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -319,6 +320,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -401,23 +412,6 @@
 "es que es software libre, lo que significa que respeta la libertad del "
 "usuario. Adicionalmente, ofrece más opciones."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">engaña a los usuarios para que "
-"creen una cuenta en su red</a> haciéndoles creer que eso es necesario para "
-"poder instalar y utilizar el sistema operativo Windows (que es software "
-"malicioso). La cuenta puede utilizarse para vigilancia y/o vulnerar los "
-"derechos de los usuarios de múltiples maneras, como convertir el software "
-"que han comprado en un producto por suscripción."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -497,3 +491,19 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-";
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+#~ "setup-now-prevents-local-account-creation/\">engaña a los usuarios para "
+#~ "que creen una cuenta en su red</a> haciéndoles creer que eso es necesario 
"
+#~ "para poder instalar y utilizar el sistema operativo Windows (que es "
+#~ "software malicioso). La cuenta puede utilizarse para vigilancia y/o "
+#~ "vulnerar los derechos de los usuarios de múltiples maneras, como "
+#~ "convertir el software que han comprado en un producto por suscripción."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- proprietary.fr.po   17 Nov 2020 11:18:48 -0000      1.384
+++ proprietary.fr.po   19 Nov 2020 10:31:32 -0000      1.385
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-17 12:18+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -315,6 +316,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -398,23 +409,6 @@
 "libertés numériques de l'utilisateur. En prime, ce jeu propose plus "
 "d'options."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">piège les utilisateurs pour "
-"qu'ils créent un compte sur son réseau</a> afin de pouvoir utiliser le "
-"système d'exploitation Windows, qui est un maliciel. Ce compte peut être "
-"utilisé pour surveiller les gens ou violer leurs droits de diverses "
-"manières, par exemple en transformant les logiciels qu'ils ont achetés en "
-"produits vendus par abonnement."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -487,3 +481,19 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-";
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+#~ "setup-now-prevents-local-account-creation/\">piège les utilisateurs pour "
+#~ "qu'ils créent un compte sur son réseau</a> afin de pouvoir utiliser le "
+#~ "système d'exploitation Windows, qui est un maliciel. Ce compte peut être 
"
+#~ "utilisé pour surveiller les gens ou violer leurs droits de diverses "
+#~ "manières, par exemple en transformant les logiciels qu'ils ont achetés 
en "
+#~ "produits vendus par abonnement."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.it-diff.html    16 Nov 2020 16:04:03 -0000      1.202
+++ proprietary.it-diff.html    19 Nov 2020 10:31:32 -0000      1.203
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,8 +69,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -211,6 +211,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011060"&gt;
     &lt;p&gt;A new app published by Google &lt;a
     
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
@@ -256,15 +266,6 @@
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to be able to install
-    and use the Windows operating system, which is malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -328,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.it.po   16 Nov 2020 16:04:03 -0000      1.239
+++ proprietary.it.po   19 Nov 2020 10:31:32 -0000      1.240
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -521,16 +531,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.ja-diff.html    16 Nov 2020 16:04:03 -0000      1.207
+++ proprietary.ja-diff.html    19 Nov 2020 10:31:32 -0000      1.208
@@ -56,14 +56,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -161,9 +161,9 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
@@ -210,6 +210,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011060"&gt;
     &lt;p&gt;A new app published by Google &lt;a
     
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
@@ -255,15 +265,6 @@
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to be able to install
-    and use the Windows operating system, which is malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -327,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary.ja.po   16 Nov 2020 16:04:03 -0000      1.223
+++ proprietary.ja.po   19 Nov 2020 10:31:32 -0000      1.224
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -379,16 +389,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.nl-diff.html    16 Nov 2020 16:04:03 -0000      1.203
+++ proprietary.nl-diff.html    19 Nov 2020 10:31:32 -0000      1.204
@@ -127,17 +127,17 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -211,6 +211,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011060"&gt;
     &lt;p&gt;A new app published by Google &lt;a
     
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
@@ -256,15 +266,6 @@
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to be able to install
-    and use the Windows operating system, which is malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -328,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary.nl.po   16 Nov 2020 16:04:03 -0000      1.213
+++ proprietary.nl.po   19 Nov 2020 10:31:32 -0000      1.214
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -424,16 +434,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary.pl-diff.html    16 Nov 2020 16:04:03 -0000      1.220
+++ proprietary.pl-diff.html    19 Nov 2020 10:31:32 -0000      1.221
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -155,18 +155,18 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -210,6 +210,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011060"&gt;
     &lt;p&gt;A new app published by Google &lt;a
     
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
@@ -255,15 +265,6 @@
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to be able to install
-    and use the Windows operating system, which is malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -327,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.pl.po   16 Nov 2020 16:04:03 -0000      1.206
+++ proprietary.pl.po   19 Nov 2020 10:31:32 -0000      1.207
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -605,16 +615,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.pot     16 Nov 2020 16:04:03 -0000      1.203
+++ proprietary.pot     19 Nov 2020 10:31:32 -0000      1.204
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\";>is
 "
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a "
 
"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\";>lets
 "
 "banks and creditors deactivate people's Android devices</a> if they fail to "
@@ -314,16 +324,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a "
-"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
-"users to create an account on their network</a> to be able to install and "
-"use the Windows operating system, which is malware. The account can be used "
-"for surveillance and/or violating people's rights in many ways, such as "
-"turning their purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary.pt-br-diff.html 16 Nov 2020 16:04:03 -0000      1.12
+++ proprietary.pt-br-diff.html 19 Nov 2020 10:31:32 -0000      1.13
@@ -187,97 +187,94 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li <span class="removed"><del><strong>id="M202007010"&gt;
-    &lt;p&gt;BMW will remotely</strong></del></span> <span 
class="inserted"><ins><em>id="M202011060"&gt;
-    &lt;p&gt;A new app published by Google</em></ins></span> &lt;a
+    &lt;p&gt;BMW will remotely</strong></del></span> <span 
class="inserted"><ins><em>id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
-    enable</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
-    banks</em></ins></span> and <span class="removed"><del><strong>disable 
functionality in cars&lt;/a&gt; through a universal
-    back door.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>creditors deactivate people's Android 
devices&lt;/a&gt; if they
-    fail to make payments. If someone's device gets deactivated, it will
-    be limited to basic functionality, such as emergency calling and
-    access to settings.&lt;/p&gt;</em></ins></span>
+    enable and disable functionality in cars&lt;/a&gt; 
through</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't 
have</em></ins></span>
+    a <span class="removed"><del><strong>universal
+    back door.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that 
bosses</strong></del></span> <span class="inserted"><ins><em>id="M201905281"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give</em></ins></span> their <span 
class="removed"><del><strong>own computers&lt;/a&gt;, so the
-    bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone 
number&lt;/a&gt; in order to be able to create an account</em></ins></span> on 
<span class="removed"><del><strong>them.&lt;/p&gt;
-
-    &lt;p&gt;This shows why requiring</strong></del></span>
-    the <span class="removed"><del><strong>user's 
&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>company's network. On top of mistreating their users 
by providing
-    nonfree software, Microsoft</em></ins></span> is <span 
class="removed"><del><strong>not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, 
so</strong></del></span> <span class="inserted"><ins><em>Facebook account. 
According to</em></ins></span> the
+    <span class="removed"><del><strong>bosses can spy</strong></del></span> 
<span class="inserted"><ins><em>article, Zoom and Facebook
+    don't even mention this surveillance</em></ins></span> on <span 
class="removed"><del><strong>them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is 
not</strong></del></span> <span class="inserted"><ins><em>their privacy policy 
page,
+    making this</em></ins></span> an <span 
class="removed"><del><strong>adequate basis for protecting digital privacy.  
The boss can coerce
+    most workers into consenting to almost anything,</strong></del></span> 
<span class="inserted"><ins><em>obvious violation of people's 
privacy</em></ins></span> even <span class="removed"><del><strong>probable 
exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal</strong></del></span> <span class="inserted"><ins><em>tracking 
their lives outside the computer</em></ins></span> and <span 
class="removed"><del><strong>bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>violates their 
privacy.&lt;/p&gt;</em></ins></span>
+    be illegal</strong></del></span> <span class="inserted"><ins><em>in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202011060"&gt;
+    &lt;p&gt;A new app published by Google &lt;a
+    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
+    banks</em></ins></span> and <span class="removed"><del><strong>bosses that 
demand</strong></del></span> <span class="inserted"><ins><em>creditors 
deactivate people's Android devices&lt;/a&gt; if they
+    fail to make payments. If someone's device gets 
deactivated,</em></ins></span> it <span 
class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>will</em></ins></span>
+    be <span class="removed"><del><strong>prosecuted for 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>limited to 
basic functionality, such as emergency calling and
+    access to settings.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="M201504210"&gt;
     &lt;p&gt;Runescape is a popular online game with some &lt;a
     
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
-    addictive features&lt;/a&gt; derived from &lt;a
-    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    addictive features&lt;/a&gt; derived from</strong></del></span> <span 
class="inserted"><ins><em>id="M201905281"&gt;
+    &lt;p&gt;Microsoft</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
     behavioral manipulation techniques&lt;/a&gt;. Certain
-    repetitive aspects</strong></del></span> <span 
class="inserted"><ins><em>id="M202006120"&gt;
-    &lt;p&gt;The company behind Zoom does not only deny
-    users' computer freedom by developing this piece</em></ins></span>
-    of <span class="inserted"><ins><em>nonfree software, it also violates 
users' civil rights by &lt;a
-    
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship"&gt;banning
-    events and censoring users&lt;/a&gt; to serve</em></ins></span> the <span 
class="removed"><del><strong>game, like</strong></del></span> <span 
class="inserted"><ins><em>agenda of governments.&lt;/p&gt;
-
-    &lt;p&gt;Freedom respecting programs such as</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
-    grinding&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Jitsi"&gt;Jitsi&lt;/a&gt;
 or BigBlueButton</em></ins></span>
-    can be <span class="removed"><del><strong>minimised by 
becoming</strong></del></span> <span class="inserted"><ins><em>used instead, 
better still if installed in</em></ins></span> a <span 
class="removed"><del><strong>paying member, and can
-    thus encourage children and impressionable people to spend money on
-    the game.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server controlled
-    by its users.&lt;/p&gt;</em></ins></span>
+    repetitive aspects of the game, like &lt;a
+    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
+    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
+    thus encourage children and impressionable</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces</em></ins></span>
+    people to <span class="removed"><del><strong>spend 
money</strong></del></span> <span class="inserted"><ins><em>give their phone 
number&lt;/a&gt; in order to be able to create an account</em></ins></span> on
+    the <span 
class="removed"><del><strong>game.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company's network. On top of mistreating their users 
by providing
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
-    Trump's campaign app, like Modi's campaign app,</strong></del></span> 
<span class="inserted"><ins><em>id="M202010221"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+    Trump's campaign app, like Modi's campaign app, is &lt;a
     
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop</strong></del></span> 
<span class="inserted"><ins><em>imposing its
-    surveillance</em></ins></span> on <span class="removed"><del><strong>users 
as well
-    as snooping</strong></del></span> <span class="inserted"><ins><em>the game 
of Minecraft by &lt;a
-    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account</em></ins></span> on <span 
class="removed"><del><strong>them itself&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says that Biden's app</strong></del></span> <span 
class="inserted"><ins><em>Microsoft's network&lt;/a&gt;. 
Microsoft</em></ins></span>
-    has <span class="removed"><del><strong>a less manipulative overall
-    approach, but</strong></del></span> <span class="inserted"><ins><em>bought 
the game and will merge all accounts into its network,
-    which will give them access to people's data.&lt;/p&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>id="M202006120"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article says that Biden's 
app has a less manipulative overall
+    approach, but that</strong></del></span> <span 
class="inserted"><ins><em>company behind Zoom</em></ins></span> does not <span 
class="removed"><del><strong>tell us whether</strong></del></span> <span 
class="inserted"><ins><em>only deny
+    users' computer freedom by developing this piece
+    of nonfree software,</em></ins></span> it <span 
class="removed"><del><strong>has functionalities we
+    consider malicious,</strong></del></span> <span 
class="inserted"><ins><em>also violates users' civil rights by &lt;a
+    
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship"&gt;banning
+    events and censoring users&lt;/a&gt; to serve the agenda of 
governments.&lt;/p&gt;
 
-    &lt;p&gt;Minecraft players &lt;a
-    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is</em></ins></span> that 
<span class="removed"><del><strong>does not tell us 
whether</strong></del></span> it <span class="removed"><del><strong>has 
functionalities we
-    consider malicious, such as sending data</strong></del></span> <span 
class="inserted"><ins><em>is free
-    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>user has not explicitly
-    asked to send.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Freedom respecting programs</em></ins></span> such as <span 
class="removed"><del><strong>sending data the user has not explicitly
+    asked to send.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://directory.fsf.org/wiki/Jitsi"&gt;Jitsi&lt;/a&gt; or 
BigBlueButton
+    can be used instead, better still if installed in a server controlled
+    by its users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers are</strong></del></span> <span 
class="inserted"><ins><em>id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to 
be</em></ins></span> able to <span class="removed"><del><strong>&lt;a
-    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what</strong></del></span> <span 
class="inserted"><ins><em>install
-    and use</em></ins></span> the <span class="removed"><del><strong>user is 
watching&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is 
<span class="removed"><del><strong>illegal due</strong></del></span> <span 
class="inserted"><ins><em>malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software</em></ins></span> to
-    <span class="removed"><del><strong>the Video Privacy Protection Act of 
1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a subscription product.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;TV manufacturers are able to</strong></del></span> <span 
class="inserted"><ins><em>id="M202010221"&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring</em></ins></span>
+    every <span class="removed"><del><strong>second of 
what</strong></del></span> <span class="inserted"><ins><em>player to open an 
account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest</em></ins></span> is <span 
class="removed"><del><strong>watching&lt;/a&gt;. This</strong></del></span> 
<span class="inserted"><ins><em>that it</em></ins></span> is <span 
class="removed"><del><strong>illegal due to</strong></del></span> <span 
class="inserted"><ins><em>free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>Video Privacy Protection Act of 1988, but they're 
circumventing</strong></del></span> <span class="inserted"><ins><em>user's 
computer freedom. As a bonus,</em></ins></span>
+    it <span class="removed"><del><strong>through 
EULAs.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>offers 
more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -341,7 +338,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary.pt-br.po        16 Nov 2020 16:04:03 -0000      1.338
+++ proprietary.pt-br.po        19 Nov 2020 10:31:32 -0000      1.339
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-07-26 08:55-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -318,6 +318,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -369,16 +379,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.418
retrieving revision 1.419
diff -u -b -r1.418 -r1.419
--- proprietary.ru.po   16 Nov 2020 18:02:21 -0000      1.418
+++ proprietary.ru.po   19 Nov 2020 10:31:32 -0000      1.419
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +319,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -401,23 +412,6 @@
 "в том, что это свободная программа, а 
значит, она уважает вычислительную "
 "свободу пользователя. Вдобавок в ней 
больше настроек."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">обманом 
заставляет "
-"пользователей создавать учетную запись в 
их сети</a>, перед тем как они "
-"смогут установить и пользоваться 
операционной системой Windows, которая "
-"вредоносна. Учетная запись может 
применяться для слежки или нарушения прав "
-"человека разными способами, например, 
обращением приобретенных ими программ "
-"в продукт, работающий по подписке."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -494,6 +488,22 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-";
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+#~ "setup-now-prevents-local-account-creation/\">обманом 
заставляет "
+#~ "пользователей создавать учетную запись 
в их сети</a>, перед тем как они "
+#~ "смогут установить и пользоваться 
операционной системой Windows, которая "
+#~ "вредоносна. Учетная запись может 
применяться для слежки или нарушения "
+#~ "прав человека разными способами, 
например, обращением приобретенных ими "
+#~ "программ в продукт, работающий по 
подписке."
+
+#~ msgid ""
 #~ "The addictive Genshin Impact relentlessly <a href=\"https://www.";
 #~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
 #~ "over-the-world\">coerces players to spend money by overwhelming the game "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.tr.po   16 Nov 2020 16:04:03 -0000      1.76
+++ proprietary.tr.po   19 Nov 2020 10:31:32 -0000      1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-14 14:39+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -314,6 +314,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -403,23 +413,6 @@
 "yazılım olmasıdır, yani bilgisayar kullanıcılarının özgürlüğüne 
saygılıdır. "
 "Bonus olarak daha fazla seçenek sunuyor."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft, zaten kendisi kötücül bir yazılım olan Windows işletim 
sistemini "
-"kurabilmeleri ve kullanabilmeleri için <a href=\"https://www.howtogeek.";
-"com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"
-"\">kullanıcıları ağlarında hesap açmaları için kandırıyor</a>. Bu 
hesap, "
-"kişilerin gözetimi ve/veya haklarının çok çeşitli biçimlerde ihlal 
edilmesi "
-"için, örneğin satın aldıkları bir ürünü abone olunmuş bir ürüne 
dönüştürmek "
-"gibi, kullanılabilir."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,6 +494,22 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-";
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft, zaten kendisi kötücül bir yazılım olan Windows işletim "
+#~ "sistemini kurabilmeleri ve kullanabilmeleri için <a href=\"https://www.";
+#~ "howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-"
+#~ "account-creation/\">kullanıcıları ağlarında hesap açmaları için "
+#~ "kandırıyor</a>. Bu hesap, kişilerin gözetimi ve/veya haklarının çok 
"
+#~ "çeşitli biçimlerde ihlal edilmesi için, örneğin satın aldıkları 
bir ürünü "
+#~ "abone olunmuş bir ürüne dönüştürmek gibi, kullanılabilir."
+
+#~ msgid ""
 #~ "The addictive Genshin Impact relentlessly <a href=\"https://www.";
 #~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
 #~ "over-the-world\">coerces players to spend money by overwhelming the game "

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary.zh-cn.po        17 Nov 2020 10:00:05 -0000      1.88
+++ proprietary.zh-cn.po        19 Nov 2020 10:31:32 -0000      1.89
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-11-17 17:29+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -294,6 +295,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -368,20 +379,6 @@
 "Minetest</a>,而不用非要玩 Minecraft。Minetest 
的重要优点是自由软件,这意味着"
 "它尊重用户的计算自由。此外,Minetest 
还提供了更多可选项。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"微软 <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-";
-"now-prevents-local-account-creation/\">欺骗用户创建网络账号</a>,这æ
 ·å°±å¯ä»¥å®‰"
-"装和使用 Windows 
操作系统——一个恶意软件。这种账号可以用来监控用户并且/或è€
…还"
-"有多种违反人们权利的方式,比如把人们购买的软件变成订é˜
…的软件。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -466,6 +463,20 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-";
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "微软 <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
+#~ 
"setup-now-prevents-local-account-creation/\">欺骗用户创建网络账号</a>,这"
+#~ "样就可以安装和使用 Windows 
操作系统——一个恶意软件。这种账号可以用来监控用"
+#~ "户并且/或者
还有多种违反人们权利的方式,比如把人们购买的软件变成订é˜
…的软"
+#~ "件。"
+
+#~ msgid ""
 #~ "The addictive Genshin Impact relentlessly <a href=\"https://www.";
 #~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
 #~ "over-the-world\">coerces players to spend money by overwhelming the game "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary.zh-tw-diff.html 16 Nov 2020 16:04:04 -0000      1.183
+++ proprietary.zh-tw-diff.html 19 Nov 2020 10:31:32 -0000      1.184
@@ -127,16 +127,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -212,6 +212,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011060"&gt;
     &lt;p&gt;A new app published by Google &lt;a
     
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
@@ -257,15 +267,6 @@
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201912160"&gt;
-    &lt;p&gt;Microsoft is &lt;a
-    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
-    users to create an account on their network&lt;/a&gt; to be able to install
-    and use the Windows operating system, which is malware. The account can
-    be used for surveillance and/or violating people's rights in many ways,
-    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -329,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/11/16 16:04:04 $
+$Date: 2020/11/19 10:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary.zh-tw.po        16 Nov 2020 16:04:04 -0000      1.193
+++ proprietary.zh-tw.po        19 Nov 2020 10:31:32 -0000      1.194
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A new app published by Google <a href=\"https://www.xda-developers.com/";
 "google-device-lock-controller-banks-payments/\">lets banks and creditors "
 "deactivate people's Android devices</a> if they fail to make payments. If "
@@ -494,16 +504,6 @@
 "it offers more options."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- pt-br.po    16 Nov 2020 16:04:04 -0000      1.297
+++ pt-br.po    19 Nov 2020 10:31:32 -0000      1.298
@@ -4595,6 +4595,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.508
retrieving revision 1.509
diff -u -b -r1.508 -r1.509
--- ru.po       16 Nov 2020 18:29:59 -0000      1.508
+++ ru.po       19 Nov 2020 10:31:33 -0000      1.509
@@ -5627,6 +5627,16 @@
 "еще лучше, если они установлены на 
сервере, контролируемом его "
 "пользователями."
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid "Copyright &copy; 2020 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2020 Free Software Foundation, Inc."

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- tr.po       16 Nov 2020 16:04:05 -0000      1.81
+++ tr.po       19 Nov 2020 10:31:33 -0000      1.82
@@ -4095,6 +4095,16 @@
 "\">Jitsi</a> veya BigBlueButton gibi programlar kullanılabilir, bunların "
 "kullanıcılar tarafından denetlenen bir sunucuya kurulması en iyisidir."
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- zh-cn.po    16 Nov 2020 16:04:05 -0000      1.77
+++ zh-cn.po    19 Nov 2020 10:31:33 -0000      1.78
@@ -4017,6 +4017,16 @@
 "a> 或 BigBlueButton 可以代替 
Zoom,如果能够使用由用户自己控制的服务器就更好"
 "了。"
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- zh-tw.po    16 Nov 2020 16:04:05 -0000      1.233
+++ zh-tw.po    19 Nov 2020 10:31:33 -0000      1.234
@@ -3998,6 +3998,16 @@
 "installed in a server controlled by its users."
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2020+} Free
 # | Software Foundation, Inc.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]