www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 4 Jan 2021 05:03:05 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/01/04 05:03:04

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-obsolescence.es.po 
                         proprietary-obsolescence.fr.po 
                         proprietary-obsolescence.pot 
                         proprietary-obsolescence.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.450&r2=1.451
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pot?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.364&r2=1.365
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.580&r2=1.581
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.376&r2=1.377
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.358&r2=1.359
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.663&r2=1.664
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.415&r2=1.416
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.441&r2=1.442
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.544&r2=1.545
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.253&r2=1.254

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- de.po       30 Dec 2020 10:33:44 -0000      1.253
+++ de.po       4 Jan 2021 10:03:01 -0000       1.254
@@ -12178,6 +12178,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -12185,6 +12194,14 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014-2018-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 201<ins>3</ins>-2018 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Software - GNU-Projekt - Free Software Foundation"
@@ -12631,6 +12648,14 @@
 msgid "Latest additions"
 msgstr "Letzte Ergänzungen"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -12660,13 +12685,13 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
 
@@ -13991,6 +14016,13 @@
 "Insbesondere können so E-Mails von Parlamentarier gesammelt werden, da diese 
"
 "sie über Microsoft durchschleusen."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015-] {+2015-2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Haltestricke - GNU-Projekt - Free Software Foundation"
@@ -14394,6 +14426,15 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
 #~| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
 #~ msgid ""

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- es.po       30 Dec 2020 10:33:44 -0000      1.363
+++ es.po       4 Jan 2021 10:03:01 -0000       1.364
@@ -12485,6 +12485,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -12498,6 +12507,14 @@
 "modelos</a>, de modo que si alguien trata ahora de restaurar las "
 "Preferencias por defecto, la tableta se vuelve inutilizable."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Software privativo - Proyecto GNU - Free Software Foundation"
@@ -12824,6 +12841,14 @@
 msgid "Latest additions"
 msgstr "Añadidos recientes"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -12852,18 +12877,18 @@
 "de este sitio web."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
-# | 2020+} Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Sabotage+} - GNU Project - Free Software
@@ -14223,6 +14248,13 @@
 "Específicamente, eso le permite recoger los correos de los miembros del "
 "Parlamento, porque pasan a través de Microsoft."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -14501,6 +14533,17 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
 #~ msgid ""
 #~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
 #~ "the easiest way to make sure it isn't spying on you is to disconnect it "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.450
retrieving revision 1.451
diff -u -b -r1.450 -r1.451
--- fr.po       30 Dec 2020 23:17:20 -0000      1.450
+++ fr.po       4 Jan 2021 10:03:01 -0000       1.451
@@ -10754,6 +10754,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -10767,6 +10776,14 @@
 "anciens</a>, de sorte que si on essaie de réinstaller les réglages par "
 "défaut, la tablette devient inutilisable."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Logiciel privateur - Projet GNU - Free Software Foundation "
@@ -11063,6 +11080,14 @@
 msgid "Latest additions"
 msgstr "Ajouts récents"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -11090,8 +11115,14 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2020 Free Software Foundation, Inc."
 
@@ -12275,6 +12306,13 @@
 "En particulier, il peut récupérer les courriels des membres du Parlement 
par "
 "ce moyen, car ils l'envoient par l'intermédiaire de Microsoft."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr "Ancrage privateur - Projet GNU - Free Software Foundation"
@@ -12517,3 +12555,8 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013-2020 Free Software Foundation, Inc."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- it.po       30 Dec 2020 10:33:45 -0000      1.253
+++ it.po       4 Jan 2021 10:03:02 -0000       1.254
@@ -11299,6 +11299,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -11306,6 +11315,14 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014-2017-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Software Proprietario - Progetto GNU - Free Software Foundation"
@@ -11756,6 +11773,14 @@
 msgid "Latest additions"
 msgstr "Ultime aggiunte"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -11785,13 +11810,13 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
@@ -13083,6 +13108,13 @@
 "Nello specifico può raccogliere i messaggi di posta elettronica dei membri "
 "del Parlamento, dato che passano attraverso Microsoft."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015-] {+2015-2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -13479,6 +13511,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- ja.po       30 Dec 2020 10:33:45 -0000      1.261
+++ ja.po       4 Jan 2021 10:03:02 -0000       1.262
@@ -8904,6 +8904,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -8911,6 +8920,12 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9221,6 +9236,14 @@
 msgid "Latest additions"
 msgstr "最新の追加"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -9250,7 +9273,7 @@
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -10369,6 +10392,12 @@
 "å…
·ä½“的には、メールがマイクロソフトを経由するので、この方法で議員のメンバの"
 "メールを集められます。"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr ""
@@ -10659,6 +10688,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of January, 2017, the files in this directory list around 260 "
 #~| "instances of malicious functionalities, but there are surely thousands "
 #~| "more we don't know about."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- nl.po       30 Dec 2020 10:33:45 -0000      1.254
+++ nl.po       4 Jan 2021 10:03:02 -0000       1.255
@@ -8100,6 +8100,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -8107,6 +8116,14 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015, 2016-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Niet-vrije software - GNU-project - Free Software Foundation"
@@ -8558,6 +8575,14 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -8583,13 +8608,13 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -9573,6 +9598,14 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2011-] {+2015-2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2011 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2011 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -9942,6 +9975,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2019, the files in this directory list around 400 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- pl.po       30 Dec 2020 10:33:45 -0000      1.253
+++ pl.po       4 Jan 2021 10:03:02 -0000       1.254
@@ -7521,6 +7521,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7528,6 +7537,14 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr ""
@@ -8061,6 +8078,14 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -8089,11 +8114,11 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
@@ -9059,6 +9084,14 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2015-2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -9471,6 +9504,13 @@
 msgstr "<a href=\"/philosophy/malware-microsoft.html\">Malware Microsoftu</a>"
 
 #, fuzzy
+#~| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
 #~| msgid "<a href=\"/philosophy/malware-apple.html\">Apple Malware</a>"
 #~ msgid ""
 #~ "<a href=\"/proprietary/proprietary.html\">Proprietary malware</a> &rarr; "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- pot 30 Dec 2020 10:33:46 -0000      1.252
+++ pot 4 Jan 2021 10:03:02 -0000       1.253
@@ -7121,6 +7121,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7128,6 +7137,10 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr ""
@@ -7371,6 +7384,14 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #
 #
 #
@@ -7394,7 +7415,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 
@@ -8282,6 +8303,10 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr ""

Index: proprietary-obsolescence.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-obsolescence.es.po      23 Nov 2020 14:35:48 -0000      1.17
+++ proprietary-obsolescence.es.po      4 Jan 2021 10:03:02 -0000       1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2019-11-24 12:20+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -126,6 +127,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
@@ -311,7 +321,11 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-obsolescence.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-obsolescence.fr.po      23 Nov 2020 14:35:48 -0000      1.21
+++ proprietary-obsolescence.fr.po      4 Jan 2021 10:03:02 -0000       1.22
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2019-11-23 17:20+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
 "Language-Team: French <trad-gnu@apri.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Obsolescence - GNU Project - Free Software Foundation"
@@ -122,6 +123,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
@@ -304,7 +314,11 @@
 "infos nécessaires."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-obsolescence.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.pot,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-obsolescence.pot        23 Nov 2020 14:35:48 -0000      1.10
+++ proprietary-obsolescence.pot        4 Jan 2021 10:03:02 -0000       1.11
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -99,6 +99,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a "
+"href=\"https://www.quicken.com/support/quicken-discontinuation-policy\";>has "
+"a discontinuation policy aka planned obsolescence</a> which is an injustice "
+"to users. A free (as in freedom) program would let users' to control the "
+"software but when you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a "
 
"href=\"https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\";>
 "
@@ -225,7 +234,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-obsolescence.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-obsolescence.ru.po      23 Nov 2020 14:35:48 -0000      1.16
+++ proprietary-obsolescence.ru.po      4 Jan 2021 10:03:02 -0000       1.17
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Obsolescence - GNU Project - Free Software Foundation"
@@ -123,6 +124,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
 "door that is used for updates and <a href=\"https://www.theregister.co.";
 "uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
@@ -303,7 +313,11 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary-surveillance.de-diff.html       30 Dec 2020 10:33:46 -0000      
1.151
+++ proprietary-surveillance.de-diff.html       4 Jan 2021 10:03:02 -0000       
1.152
@@ -605,12 +605,7 @@
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
     href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
     being nonfree. It also distributes</strong></del></span> its
-    own <span class="removed"><del><strong>nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job of 
preventing</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
+    own <span class="removed"><del><strong>nonfree</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -629,85 +624,55 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006260"&gt;
-    &lt;p&gt;Most</em></ins></span> apps <span 
class="removed"><del><strong>from
-    cheating?  There</strong></del></span> <span class="inserted"><ins><em>are 
malware, but
-    Trump's campaign app, like Modi's campaign app,</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
-    users, to inspect executable proprietary apps to see what they
-    do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand the source code for these apps, and study the
-    source code somehow to determine whether they 
mistreat</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Most apps are malware, but
+    Trump's campaign app, like Modi's campaign app, is &lt;a
     
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>in
-    various ways. If it did</strong></del></span> <span 
class="inserted"><ins><em>as well
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says that Biden's app has</em></ins></span> a <span 
class="removed"><del><strong>good job of this, it could more 
or</strong></del></span> less
-    <span class="removed"><del><strong>prevent</strong></del></span> <span 
class="inserted"><ins><em>manipulative overall
+    &lt;p&gt;The article says that Biden's app has a less manipulative overall
     approach, but that does not tell us whether it has functionalities we
-    consider malicious,</em></ins></span> such <span 
class="removed"><del><strong>snooping, except when the app developers are clever
-    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>as sending data</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</strong></del></span> <span class="inserted"><ins><em>user has not 
explicitly
-    asked</em></ins></span> to <span class="removed"><del><strong>protect us. 
We must demand release</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;
+    consider malicious, such as sending data the user has not explicitly
+    asked to send.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    &lt;p&gt;The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+  &lt;li id="M201510050"&gt;
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>phones on</em></ins></span> and <span 
class="removed"><del><strong>security
-    of 283 Android VPN apps concluded that &ldquo;in spite 
of</strong></del></span> <span class="inserted"><ins><em>off, listen 
to</em></ins></span> the
-    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject
-    to poor security guarantees</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
-    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>abusive practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following</strong></del></span> <span class="inserted"><ins><em>web 
browsing history, and
-    read the contact list. This malware</em></ins></span> is <span 
class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps</strong></del></span> <span class="inserted"><ins><em>designed to disguise 
itself</em></ins></span>
-    from
-    <span class="removed"><del><strong>the research paper that 
tracks</strong></del></span> <span 
class="inserted"><ins><em>investigation.&lt;/p&gt;
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed to disguise itself
+    from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android,</em></ins></span> and <span 
class="removed"><del><strong>infringes</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries such as 
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>Appflood,
-      meant</strong></del></span> <span class="inserted"><ins><em>users cannot 
stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
-    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -721,11 +686,7 @@
   &lt;li id="M202009183"&gt;
     &lt;p&gt;Facebook &lt;a
     
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>and show them targeted ads.&lt;/dd&gt;
-
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the 
<span class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</strong></del></span> <span 
class="inserted"><ins><em>device's
+    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -734,397 +695,238 @@
     made a practice of surreptitiously activating the Siri software to &lt;a
     
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
-    This was not just occasional,</em></ins></span> it <span 
class="inserted"><ins><em>was systematic practice.&lt;/p&gt;
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
 
     &lt;p&gt;His job was to listen to these recordings, in a group that made
-    transcripts of them. He does not believes that Apple</em></ins></span> has 
<span class="removed"><del><strong>full</strong></del></span> <span 
class="inserted"><ins><em>ceased this
+    transcripts of them. He does not believes that Apple has ceased this
     practice.&lt;/p&gt;
 
     &lt;p&gt;The only reliable way to prevent this is, for the program that
-    controls</em></ins></span> access to
-      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span 
class="inserted"><ins><em>microphone</em></ins></span> to <span 
class="removed"><del><strong>read logs
-      for other apps</strong></del></span> <span 
class="inserted"><ins><em>decide when the user has
-    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span class="removed"><del><strong>also 
core</strong></del></span> <span class="inserted"><ins><em>the
-    operating</em></ins></span> system <span 
class="removed"><del><strong>logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>under</em></ins></span> it <span 
class="removed"><del><strong>stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>free as well. This way, users could make
-    sure Apple can't listen</em></ins></span> to <span 
class="removed"><del><strong>the UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910131"&gt;
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to the
-      <span class="removed"><del><strong>users. The stated purpose of the JS 
injection is</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also, it redirects the
-      user's traffic through valueclick.com (an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed</strong></del></span> <span class="inserted"><ins><em>check 
URLs</em></ins></span> that <span class="inserted"><ins><em>possibly correspond 
to
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="removed"><del><strong>non-premium 
version</strong></del></span> <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list most certainly
-    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="removed"><del><strong>app does
-      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>requests
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
-    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
-  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
-    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
+  &lt;li id="M201905280"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
-    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>phone
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
-    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
-    used for.&lt;/p&gt;</em></ins></span>
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to</em></ins></span> study <span 
class="removed"><del><strong>found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>how iOS cr&hellip;apps 
spy on users&lt;/a&gt;, because
+  &lt;li id="M201711250"&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+  &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>transmit users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
-    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
-    them from there.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span>
-    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
+  &lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage app on iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that the user types into it&lt;/a&gt;; the
+    server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
-    and <span class="removed"><del><strong>Conditions&rdquo; that spell out
-what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>honestly 
identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    and videos they make.&lt;/p&gt;
 
-    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>video</em></ins></span> you <span 
class="removed"><del><strong>disable Google Maps</strong></del></span>
-    <span class="inserted"><ins><em>take,</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>keeps them up</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
+    take, and keeps them up to date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is
-    <span class="removed"><del><strong>yet another 
example</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup</em></ins></span> of <span class="removed"><del><strong>nonfree 
software pretending</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-    when</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but</em></ins></span> it's <span 
class="removed"><del><strong>actually doing something else.  
Such</strong></del></span> <span class="inserted"><ins><em>active by default so 
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing 
would be almost
-    unthinkable with free software.&lt;/p&gt;
-
-  &lt;/li&gt;
+    &lt;p&gt;There is a way to
+    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    surveillance functionality.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
-    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>the most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span class="removed"><del><strong>their 
users with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>break Apple's
-    security to get at them, but NSA can access any of them 
through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;The article should not</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This may</em></ins></span> have <span 
class="removed"><del><strong>described these apps as
-  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>improved with &lt;a
+    &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
-    for <span class="removed"><del><strong>granted that the usual analytics 
tools are
-  legitimate, but is that valid?  Software developers 
have</strong></del></span> no <span class="removed"><del><strong>right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>possible purpose</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not</strong></del></span> <span 
class="inserted"><ins><em>than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect to 100</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span>
-    <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>an iThing, or it
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;</em></ins></span>
+    turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also</em></ins></span> a <span 
class="inserted"><ins><em>feature for web sites to track users, which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+  &lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
+    still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+  &lt;li id="M201204280"&gt;
     &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>any file on</strong></del></span> 
<span class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving a valid
-    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Android 
Telephones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span>
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202012070"&gt;
     &lt;p&gt;Baidu apps were &lt;a
     
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;caught
 collecting
     sensitive personal data&lt;/a&gt; that can be used for lifetime tracking
-    of users and putting them</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>danger. More than 1.4 billion people
-    worldwide are affected by these proprietary apps</em></ins></span> and 
<span class="inserted"><ins><em>users'
+    of users and putting them in danger. More than 1.4 billion people
+    worldwide are affected by these proprietary apps and users'
     privacy is jeopardized by this surveillance tool. Data collected by Baidu 
may be shared with Chinese government, possibly putting Chinese people in 
danger.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202004300"&gt;
     &lt;p&gt;Xiaomi phones &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions</em></ins></span> the <span class="removed"><del><strong>EU 
Copyright Directive</strong></del></span> <span class="inserted"><ins><em>user 
takes&lt;/a&gt;: starting an app, looking at a folder,
+    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
     visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services</em></ins></span> make <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>a dossier about each user, and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make
-    users identify themselves</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;
+    other streaming dis-services make a dossier about each user, and &lt;a
+    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
+    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
-
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth</strong></del></span> <span class="inserted"><ins><em>same 
wrongs when</em></ins></span> the
-      <span class="removed"><del><strong>obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really</strong></del></span> <span 
class="inserted"><ins><em>culprits are not Chinese,
-    but we condemn this no matter who</em></ins></span> does <span 
class="removed"><del><strong>turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>location 
data while in
+  &lt;li id="M201811230"&gt;
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</em></ins></span>
-    even <span class="removed"><del><strong>gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>when &ldquo;location services&rdquo; are turned 
off, even when</em></ins></span>
-    the <span class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201711210"&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS apps</strong></del></span> 
<span class="inserted"><ins><em>Android)</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+  &lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and location 
<span class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>tracking, you must
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
     disable Google Play itself to completely stop the tracking.  This is
-    yet another example</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to 
<span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>obey</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>user,
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
@@ -1132,105 +934,46 @@
   &lt;li id="M201507030"&gt;
     &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> they 
<span class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>send so much data 
that their
-    transmission</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>a substantial expense for users.  Said 
transmission,
-    not wanted or requested</em></ins></span> by the
-      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
-    of <span class="removed"><del><strong>iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>some kind.&lt;/p&gt;
+    that users can't delete&lt;/a&gt;, and they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span> <span 
class="inserted"><ins><em>any file on the system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
     &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us</em></ins></span> by <span 
class="removed"><del><strong>default so it still counts 
as</strong></del></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any of them 
through</strong></del></span> <span class="inserted"><ins><em>paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>FBI can remotely 
activate</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>GPS</em></ins></span> 
and <span class="removed"><del><strong>get other info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which</strong></del></span> <span class="inserted"><ins><em>microphone in 
Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  
Here</em></ins></span> is &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>still true</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Android devices when they are
-    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
-    by <span class="removed"><del><strong>default, 
though</strong></del></span> <span class="inserted"><ins><em>Google, use a 
modified version of Android</em></ins></span> that <span 
class="removed"><del><strong>can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span class="inserted"><ins><em>voice 
all</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+  &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>personal details of 
users that install</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> is <span 
class="removed"><del><strong>the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span class="inserted"><ins><em>not 
enough to
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
     legitimize actions like this.  At this point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
@@ -1251,47 +994,29 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 
id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
-      sometimes very clever. Some trackers</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send</em></ins></span> lots of data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+  &lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even</em></ins></span> which <span 
class="removed"><del><strong>enable them to turn</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1312,251 +1037,146 @@
   &lt;li id="M202011260"&gt;
     &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
     
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop</em></ins></span> on <span class="inserted"><ins><em>each 
employee&lt;/a&gt;. After
+    snoop on each employee&lt;/a&gt;. After
     a public outburst, Microsoft stated that &lt;a
     
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
-    for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>the microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and 
web</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found to &lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed</em></ins></span> browsing <span 
class="removed"><del><strong>history,</strong></del></span> <span 
class="inserted"><ins><em>habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span class="removed"><del><strong>contact 
list. This malware is designed to
-      disguise itself</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions</em></ins></span> from <span 
class="removed"><del><strong>investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that</strong></del></span> their <span 
class="removed"><del><strong>transmission is</strong></del></span> <span 
class="inserted"><ins><em>stores, but this shows
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
     once more how unsafe nonfree software can be. Tools that are supposed
-    to protect</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>proprietary system are, instead, infecting it with
-    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>original malware).&lt;/p&gt;</em></ins></span>
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops):</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811020"&gt;
+  &lt;li id="M201811020"&gt;
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running 
it&lt;/a&gt;.</em></ins></span> The <span class="removed"><del><strong>Wall
-      Street Journal (in an article blocked from us by</strong></del></span> 
<span class="inserted"><ins><em>result is
-    often</em></ins></span> a <span class="removed"><del><strong>paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot of money.&lt;/p&gt;
-
-    &lt;p&gt;The fact</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS and microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect</strong></del></span> this <span 
class="removed"><del><strong>means Windows laptops.)  
Here</strong></del></span> is
-      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says</strong></del></span> <span class="inserted"><ins><em>used 
for repression of forbidden sharing
-    makes</em></ins></span> it <span class="removed"><del><strong>will 
eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies 
of</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat app's 
principal purpose</strong></del></span> <span 
class="inserted"><ins><em>software</em></ins></span>
-    is <span class="removed"><del><strong>to restrict</strong></del></span> 
<span class="inserted"><ins><em>not a cure for</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
computer,</strong></del></span> <span class="inserted"><ins><em>nasty 
thing,</em></ins></span> but <span class="inserted"><ins><em>cannot 
make</em></ins></span> it <span class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202003260"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>moviepass app and 
dis-service spy on users even more than users
-      expected. It</strong></del></span> <span class="inserted"><ins><em>Apple 
iOS version of Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users' data</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if the user doesn't 
have</em></ins></span>
-    a <span class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Facebook 
account. According to the article, Zoom and Facebook
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
     don't even mention this surveillance on their privacy policy page,
     making this an obvious violation of people's privacy even in their
-    own terms.&lt;/p&gt;</em></ins></span>
+    own terms.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202003010"&gt;
+  &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    estimates whether the user has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
Sarahah</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring</em></ins></span> app <span 
class="inserted"><ins><em>does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+  &lt;li id="M202001290"&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
     surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>be a &lt;a
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
     spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and</em></ins></span> that <span 
class="inserted"><ins><em>is a good
+    Any nonfree program could be doing this, and that is a good
     reason to use free software instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note:</em></ins></span> this article <span 
class="removed"><del><strong>misuses</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in</em></ins></span>
-    the <span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on <span class="removed"><del><strong>what 
people are listening to or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>the device.  Many employers demand</em></ins></span> 
to <span class="removed"><del><strong>serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
+    software on the device.  Many employers demand to do this.  For the
     employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging 
by</strong></del></span> <span class="inserted"><ins><em>grant 
it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;</em></ins></span>
-    access <span class="removed"><del><strong>it demands</strong></del></span> 
to <span class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>the phone's microphone, photos, text messages, 
contacts, and
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search</strong></del></span> <span 
class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="removed"><del><strong>that it will&lt;/a&gt;
-        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>is mandatory at</em></ins></span> some <span 
class="removed"><del><strong>of its phones.</strong></del></span> <span 
class="inserted"><ins><em>workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note:</em></ins></span> The <span 
class="removed"><del><strong>app will give Verizon the same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
-    saying</em></ins></span> that <span class="removed"><del><strong>Google 
normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on</strong></del></span> <span 
class="inserted"><ins><em>tests were</em></ins></span> only <span 
class="removed"><del><strong>one phone&lt;/a&gt;, and</strong></del></span> 
<span class="inserted"><ins><em>performed on</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>Android version
-    of</em></ins></span> the <span class="inserted"><ins><em>app, and that, 
according to Apple, &ldquo;this kind of
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
     tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the app <span 
class="removed"><del><strong>remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span> <span class="inserted"><ins><em>broad permissions 
in order to use one</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
-    functionalities.&lt;/p&gt;</em></ins></span>
+    into giving the app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts</strong></del></span> <span 
class="inserted"><ins><em>proprietary
-    program is a form</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>surveillance.  There</em></ins></span> is <span 
class="removed"><del><strong>inadequate as</strong></del></span> a <span 
class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span>
-    <span class="inserted"><ins><em>proprietary program for adjusting a 
certain telescopic rifle sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of</em></ins></span> all <span 
class="removed"><del><strong>conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the 10,000 or more people
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With a free program there would not be a list of who has installed
-    it.&lt;/p&gt;</em></ins></span>
+    it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of the operating system, in order to gather</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>much 
private data as
+  &lt;li id="M201907081"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;</em></ins></span>
+    having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+  &lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
@@ -1567,144 +1187,68 @@
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>is secretly a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
-      and suggests</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as</em></ins></span> you <span 
class="inserted"><ins><em>must expect from nonfree
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>share 
the picture you take according</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone 
app&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>be allowed 
into</em></ins></span>
-    the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;</em></ins></span>
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="inserted"><ins><em>app is a</em></ins></span> 
spyware <span class="removed"><del><strong>feature seems to require online 
access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>that can snoop on a lot of
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
     sensitive data, including user's location and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="inserted"><ins><em>employers 
and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can 
easily</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
-    and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>freedom 
to make their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a 
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>same 
thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is 
available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>new one</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>movements of Android phones</em></ins></span> 
and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>addition to
-      the snooping done by</strong></del></span> the phone <span 
class="removed"><del><strong>company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>has 
to</em></ins></span> be <span class="removed"><del><strong>distracted by the 
question of whether</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked the user</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps 
that have access</em></ins></span> to
-    the <span class="removed"><del><strong>app developer</strong></del></span> 
<span class="inserted"><ins><em>network</em></ins></span> but <span 
class="removed"><del><strong>did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>no direct access</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
the
-      <span class="removed"><del><strong>weakness of the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>massive
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
     surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201903201"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>remote-control sex toy 
was</strong></del></span> <span class="inserted"><ins><em>study of 24 
&ldquo;health&rdquo; apps</em></ins></span> found <span 
class="removed"><del><strong>to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>that 
19</em></ins></span> of <span class="removed"><del><strong>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span 
class="inserted"><ins><em>them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which</em></ins></span> can <span 
class="removed"><del><strong>remotely control the toys 
with</strong></del></span> <span class="inserted"><ins><em>use it
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
@@ -1714,214 +1258,103 @@
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
-    library for building</em></ins></span> mobile <span 
class="removed"><del><strong>phone. This</strong></del></span> <span 
class="inserted"><ins><em>apps, which also &lt;a
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
     way and released them, apparently not realizing that all the personal
-    data they collected</em></ins></span> would
-      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>listen in on</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span 
class="removed"><del><strong>speak
-      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps</em></ins></span> have
-      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
-    the user <span class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play</em></ins></span> found <span 
class="removed"><del><strong>a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; 
due</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
     href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an 
Android</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>a back door, 
but</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding</em></ins></span> 
that <span class="removed"><del><strong>could be a
-      misunderstanding.  However,</strong></del></span> it <span 
class="inserted"><ins><em>notify the users of what it will do
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>certainly surveillance,</strong></del></span> 
<span class="inserted"><ins><em>about a side issue. What the company does
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
-    the company gets that data</em></ins></span> at
-      <span 
class="removed"><del><strong>least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user's actions</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook</em></ins></span> can <span 
class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>correlate</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
+    Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>the app; others only say that the user is
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
@@ -1929,27 +1362,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
@@ -1958,48 +1378,22 @@
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
     the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
-    a recording. But we can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span 
class="removed"><del><strong>a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
     of the 5,855 Android apps studied by researchers were found to snoop
     and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
@@ -2068,12 +1462,13 @@
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    nonfree. It also distributes its own nonfree</em></ins></span> apps, such 
as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
+    cheating? There is no systematic way for Google, or <span 
class="removed"><del><strong>Android
+    users,</strong></del></span> <span class="inserted"><ins><em>Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
@@ -2106,23 +1501,30 @@
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>inspect executable proprietary 
apps</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>personal data in</em></ins></span> the <span 
class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
+    &lt;p&gt;Users are suing Bose</em></ins></span> for <span 
class="removed"><del><strong>these apps, and study</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
+    distributing a spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
+    the
+    <span class="removed"><del><strong>source code somehow to determine 
whether they mistreat</strong></del></span> <span class="inserted"><ins><em>app 
would record the names of the audio files</em></ins></span> users <span 
class="removed"><del><strong>in
+    various ways.</strong></del></span> <span class="inserted"><ins><em>listen 
to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The suit accuses that this was done without the users' 
consent.</em></ins></span>
+    If <span class="removed"><del><strong>it did a good 
job</strong></del></span> <span class="inserted"><ins><em>the fine 
print</em></ins></span> of <span class="inserted"><ins><em>the app said that 
users gave consent for</em></ins></span> this,
+    <span class="inserted"><ins><em>would that make</em></ins></span> it <span 
class="removed"><del><strong>could more or less
+    prevent such snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to 
design</em></ins></span>
+    the app <span class="removed"><del><strong>developers are clever
+    enough</strong></del></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
@@ -2136,35 +1538,39 @@
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
+    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot 
trust</strong></del></span> <span class="inserted"><ins><em>same information
+    about the users' searches that</em></ins></span> Google <span 
class="removed"><del><strong>to protect us. We</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    being pre-installed on only one phone&lt;/a&gt;, and the 
user</em></ins></span> must <span class="removed"><del><strong>demand 
release</strong></del></span>
+    <span class="inserted"><ins><em>explicitly opt-in before the app takes 
effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201611160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -2173,11 +1579,15 @@
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
+    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;
+    &lt;dl class="compact"&gt;</em></ins></span>
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
@@ -2199,20 +1609,60 @@
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
+      roughly <span class="removed"><del><strong>5</strong></del></span> <span 
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it 
redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
+      <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
       the non-premium version of the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
+      tracking <span class="inserted"><ins><em>the user</em></ins></span> and 
<span class="removed"><del><strong>display</strong></del></span> <span 
class="inserted"><ins><em>displaying</em></ins></span> ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
+       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+&lt;p&gt;Merely asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2220,43 +1670,67 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>require 
online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>pictures</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>likely to be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
+    even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
+    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    it may</em></ins></span> be <span class="removed"><del><strong>almost
+    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>analyzing people's conversations to serve 
them</em></ins></span> with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201604250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
+    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>TV programs
+    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>post 
on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic</em></ins></span> communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
@@ -2266,19 +1740,99 @@
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+    legitimate, but is that valid? Software developers have no <span 
class="removed"><del><strong>right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>right</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools</em></ins></span>
+    that <span class="removed"><del><strong>the user types into it&lt;/a&gt;; 
the server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73%</em></ins></span> and <span 
class="removed"><del><strong>receiving the code Apple
+      sends to it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
+  &lt;li&gt;&lt;p&gt;Around</strong></del></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        
href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
     personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
@@ -2311,19 +1865,33 @@
 
   &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>Apple's servers 
all the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>keeps them up to 
date</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs,</em></ins></span> on 
<span class="removed"><del><strong>all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>the 
average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used &lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
+    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>the 
user&lt;/a&gt;. This</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>in addition to
+    the snooping done</em></ins></span> by the
+      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>whether the app developers
     get users to say &ldquo;I agree&rdquo;. That is no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
@@ -2331,44 +1899,68 @@
   &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
+    is <span class="inserted"><ins><em>doing this in</em></ins></span> a way 
<span class="removed"><del><strong>to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>that at least is 
visible and optional&lt;/a&gt;. Not
+    as bad</em></ins></span> as <span class="inserted"><ins><em>what the 
others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    &lt;p&gt;The Simeji keyboard is</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span> <span class="inserted"><ins><em>restrict the
+    use</em></ins></span> of <span class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>data on</em></ins></span> the <span 
class="inserted"><ins><em>user's computer, but it does surveillance 
too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
+      and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to</em></ins></span> get <span class="inserted"><ins><em>the 
user's list of</em></ins></span> other <span class="removed"><del><strong>info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people's 
phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span> <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
+    approve sending personal data to the app developer</em></ins></span> but 
<span class="inserted"><ins><em>did not ask
+    about sending</em></ins></span> it
+      <span class="removed"><del><strong>is still true in iOS 
7.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>to other 
companies.  This shows the weakness of
     the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app would not.&lt;/p&gt;
+    anyone? A free software flashlight app would 
not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2378,122 +1970,184 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Skype refuses to say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
+    on <span class="removed"><del><strong>all the data in an iThing,
+      or</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That almost certainly means</em></ins></span> it <span 
class="removed"><del><strong>is totally 
incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can do so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains &lt;a
-    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202010221"&gt;
-    &lt;p&gt;Microsoft is imposing its
+    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>imposing its
     surveillance on the game of Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
     every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its network,
+    has bought the game</em></ins></span> and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> <span class="inserted"><ins><em>will merge all 
accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
-    &lt;p&gt;Minecraft players &lt;a
-    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    &lt;p&gt;Minecraft players</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects the user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;
+    software, meaning it respects the</em></ins></span> user's <span 
class="removed"><del><strong>movements around</strong></del></span> <span 
class="inserted"><ins><em>computer freedom. As</em></ins></span> a <span 
class="removed"><del><strong>physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>bonus,
+    it offers more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
-    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>phone has</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
+    &lt;p&gt;Morally, we see</em></ins></span> no <span 
class="removed"><del><strong>SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with</strong></del></span> <span 
class="inserted"><ins><em>difference between having human workers listen and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is a spyware that
+    &lt;p&gt;Red Shell is a</em></ins></span> spyware <span 
class="removed"><del><strong>sending lots of</strong></del></span> <span 
class="inserted"><ins><em>that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>the massive
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>turn the 
phones</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
     
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    information</em></ins></span> to <span class="removed"><del><strong>the 
microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console is a computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
+    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+    &lt;p&gt;They use this</em></ins></span> data <span 
class="removed"><del><strong>that their transmission is a
+      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>to manipulate people to buy things, and 
hunt</em></ins></span> for <span class="removed"><del><strong>users.  Said 
transmission, not wanted or
+      requested by the user, clearly must constitute 
spying</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;whales&rdquo; who can be led to 
spend a lot</em></ins></span> of <span class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span> <span class="inserted"><ins><em>money. 
They also
+    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
+
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span> <span class="inserted"><ins><em>cost 
money</em></ins></span>
+    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200510200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    spies</em></ins></span> on
+      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
+    have <span class="removed"><del><strong>GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose 
is</strong></del></span> <span 
class="inserted"><ins><em>nothing</em></ins></span> to <span 
class="removed"><del><strong>restrict
+      the use</strong></del></span> <span class="inserted"><ins><em>do with 
cheating.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2507,147 +2161,246 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer, but it does 
surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Stings 
devices allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
+before <span class="removed"><del><strong>and after 
going</strong></del></span> <span class="inserted"><ins><em>Amazon 
&ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006250"&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
-    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal due to
-    the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
+    every <span class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>second of 
what</em></ins></span> the <span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>user is 
watching&lt;/a&gt;. This is illegal due</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens all</strong></del></span>
+    the <span class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>Video Privacy 
Protection Act of 1988, but they're circumventing</em></ins></span>
+    it <span class="removed"><del><strong>may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>through EULAs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal 
data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>own words</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
+   information about</strong></del></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>company's
     CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
     &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
+    is</em></ins></span> that <span class="removed"><del><strong>Google 
normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>it is opt-in in newer models. But 
since</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>Vizio software</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>scenes,
+    and there is no guarantee that all future updates will 
leave</em></ins></span> the <span class="removed"><del><strong>app takes 
effect. However,</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
+    matter),</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>easiest way to make sure it isn't spying on 
you</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    to <span class="inserted"><ins><em>disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>terrestrial 
antenna
+    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>only</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
+    if you are technically oriented, is to get your own router 
(which</em></ins></span> can <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in the phone,</strong></del></span>
+    <span class="inserted"><ins><em>be an old computer running completely free 
software),</em></ins></span> and <span class="removed"><del><strong>in server 
accounts, it</strong></del></span> <span class="inserted"><ins><em>set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+    you</em></ins></span> can
+  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>article</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the facts it presents. It</em></ins></span>
+    is <span class="removed"><del><strong>inadequate as a protection against 
massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed</em></ins></span> on <span 
class="inserted"><ins><em>them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
+    the TV reports</em></ins></span> what <span 
class="removed"><del><strong>radio</strong></del></span> <span 
class="inserted"><ins><em>it is. The existence of a way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
+    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
+    sounds to be picked up by proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a
-    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
-    across devices.&lt;/p&gt;
+    manufacturers in spying on their users: their</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
+    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
+    to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>new combined 
surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>it isn't 
a TV channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
+    snoops</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>even what 
they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on 
what</em></ins></span>
+    users <span class="removed"><del><strong>submit</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or some
-    other government.&lt;/p&gt;
+    transmits users' voice on the internet</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it</em></ins></span> and <span 
class="inserted"><ins><em>would then have to give it to the US 
or</em></ins></span> some
+      <span class="removed"><del><strong>are starting</strong></del></span>
+    <span class="inserted"><ins><em>other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless</em></ins></span> it is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span class="inserted"><ins><em>done 
by free
     software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span class="removed"><del><strong>they 
present</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
@@ -2655,8 +2408,8 @@
 
   &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
+    snooping <span class="inserted"><ins><em>all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
@@ -2664,32 +2417,41 @@
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The report was</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>attitude of</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile 
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed 
to</em></ins></span> report <span class="removed"><del><strong>which other
+    apps</strong></del></span> <span class="inserted"><ins><em>what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    reports what</em></ins></span> the user <span 
class="inserted"><ins><em>watches, and the switch to turn this 
off</em></ins></span> has
+    <span class="removed"><del><strong>installed.</strong></del></span>
+    <span class="inserted"><ins><em>no effect&lt;/a&gt;.  (The fact that the 
transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+    product could spy</em></ins></span> this <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -2699,10 +2461,18 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found</em></ins></span> a way <span 
class="removed"><del><strong>that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>use its camera to 
watch</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2712,37 +2482,52 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone 
that comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+    at</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
+      users</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects 
society</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surrender to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>videos. That's</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
+    <span class="inserted"><ins><em>security for your home. Security means 
making sure they don't get</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
@@ -2750,18 +2535,23 @@
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
@@ -2770,14 +2560,27 @@
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
+  &lt;li id="M201711100"&gt;</em></ins></span>
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers to listen in on a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;</em></ins></span>
+    &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
@@ -2806,62 +2609,105 @@
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG</strong></del></span>
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>i-Que</em></ins></span> transmit
+       <span class="removed"><del><strong>conversations 
too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    can remotely control the toys with</em></ins></span> a <span 
class="removed"><del><strong>back door, but that could be</strong></del></span> 
<span class="inserted"><ins><em>mobile phone. This would enable
+    crackers to listen in on</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201502180"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
     to snoop on other people, DJI is in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    software, including videoconference software, to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
     whether you are &ldquo;active,&rdquo; that is in effect a malicious
     surveillance feature.&lt;/p&gt;
@@ -2876,78 +2722,134 @@
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
-    out prematurely and on accident and Google was planning on disclosing
+    out prematurely</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
on <span class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>accident and Google 
was planning on disclosing
     this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="inserted"><ins><em>bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy on them.&lt;/p&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span class="removed"><del><strong>specific sabotage 
method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span>
+    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is not <span 
class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span class="inserted"><ins><em>an adequate basis for protecting digital 
privacy.  The boss can coerce
+    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>almost anything, even probable exposure
+    to contagious disease that</em></ins></span> can <span 
class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.  
Software like</em></ins></span> this <span class="removed"><del><strong>way, 
because they pass</strong></del></span> <span class="inserted"><ins><em>should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
-    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201911190"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to &lt;a
+    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant surveillance if the devices implemented proper
-    security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used</em></ins></span> by 
<span class="inserted"><ins><em>their
+    out any significant surveillance</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can 
communicate</strong></del></span> <span class="inserted"><ins><em>the devices 
implemented proper
+    security, including encryption. But many devices</em></ins></span> with 
<span class="removed"><del><strong>it,</strong></del></span> <span 
class="inserted"><ins><em>proprietary
+    software lack this. Of course, they are also used by their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907210"&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
-    subcontractors discloses a thousand confidential voice recordings,
+    when it</em></ins></span> is <span class="inserted"><ins><em>not supposed 
to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>no
     way to see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer, 
based</strong></del></span> <span class="inserted"><ins><em>data 
remain</em></ins></span> on <span class="inserted"><ins><em>other 
servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>fact
-      that the device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands</em></ins></span> that the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>wrong of
-    collecting it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that the device gives the company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;The</strong></del></span> Nest <span 
class="removed"><del><strong>Cam &ldquo;smart&rdquo; camera is &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than</em></ins></span> is <span class="removed"><del><strong>&lt;a
       href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>thermostat,</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends</em></ins></span>
+    it <span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span class="inserted"><ins><em>to Amazon's 
servers, which store it indefinitely. Even
+    worse, Amazon forwards</em></ins></span> it to <span 
class="removed"><del><strong>outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2958,22 +2860,25 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript 
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ 
garage opener</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
-    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
+    and</strong></del></span> <span class="inserted"><ins><em>third-party 
companies. Thus,
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
-    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, 
where</em></ins></span> they <span class="removed"><del><strong>report even 
which page</strong></del></span> <span class="inserted"><ins><em>can be 
accessed by
+    advertising companies and government agencies. In other words,
+    deleting</em></ins></span> the <span class="removed"><del><strong>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+      send lots</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2988,22 +2893,28 @@
   snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, 
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell 
phone modem which allows
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf has a built-in cell 
phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
-    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
+  access its computers remotely</strong></del></span>
+    <span class="inserted"><ins><em>collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>present, but</em></ins></span> in the <span 
class="removed"><del><strong>car is
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>Sonos
+    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> <span class="inserted"><ins><em>past (and, who 
knows,
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
     in</em></ins></span> the <span class="removed"><del><strong>cell phone
     modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
@@ -3063,7 +2974,7 @@
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon to do this, or cease</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>data
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>data
       and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
     do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
   &lt;/li&gt;
@@ -3105,63 +3016,36 @@
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+  &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
     Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence of a 
way</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="removed"><del><strong>was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>normal</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>companies
-    monitor every aspect of</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3172,490 +3056,515 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security 
flaws. They &lt;a
+    privacy. In addition, they have a lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
-
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>and from</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>this article 
misuses</em></ins></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201603020"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+  &lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>the 600 millions social media 
profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
-    too&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
     &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    upload data</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can
-    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If you want
-    GPS navigation, get a separate navigator which runs free software
-    and works with Open Street Map.&lt;/p&gt;
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>its GPS antenna.  
If</em></ins></span> you <span class="removed"><del><strong>on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span> <span 
class="inserted"><ins><em>want
+    GPS navigation, get a separate navigator which runs free 
software</em></ins></span>
+    and <span class="removed"><del><strong>not just 
broadcasts</strong></del></span> <span class="inserted"><ins><em>works with 
Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars</em></ins></span> now &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden</em></ins></span> and 
<span class="removed"><del><strong>TV advertisements play inaudible sounds to be
-      picked up by proprietary malware</strong></del></span> running <span 
class="removed"><del><strong>on other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> with <span 
class="removed"><del><strong>Web activity,</strong></del></span>
-    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if the image is coming 
from</strong></del></span> <span class="inserted"><ins><em>send various kinds 
of data to</em></ins></span> the <span class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>TV reports what it is. The 
existence of a way</strong></del></span> <span class="inserted"><ins><em>user, 
access</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance, even if it were not 
hidden</strong></del></span> <span class="inserted"><ins><em>data is nearly 
impossible,</em></ins></span> as it <span class="removed"><del><strong>was in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>involves
+    cracking</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>car's computer, which is always hidden and 
running with
+    proprietary software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
-      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+    &lt;p&gt;Tesla cars collect lots</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting</strong></del></span> personal <span 
class="removed"><del><strong>data are totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>junkyard</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the ignition
-    key is removed, and users report that they can't disable it.&lt;/p&gt;
+  &lt;li id="M201902011"&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>cellular phone network and sends 
Ford</em></ins></span> a <span class="removed"><del><strong>step further than 
other TV manufacturers in spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed,</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>users 
report</em></ins></span> that <span class="removed"><del><strong>advertisers 
can track</strong></del></span> <span class="inserted"><ins><em>they can't 
disable it.&lt;/p&gt;
+
+    &lt;p&gt;If</em></ins></span> you 
+      <span class="removed"><del><strong>across devices.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>own 
one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
-    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
+    cars</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
     to a government-run platform&lt;/a&gt;. In practice, &lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; as part of their own spying, then
+    forward</em></ins></span> it <span class="removed"><del><strong>enabled by 
default
+      is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
-    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
-
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
-    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
 
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> to the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports a 404 error really means nothing; the server
-      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>company 
already
+      monitors. Tivo customers are unaware they're being 
watched</strong></del></span> <span class="inserted"><ins><em>choices of radio 
programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute</em></ins></span> by
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span> <span class="inserted"><ins><em>minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that</em></ins></span> users <span 
class="inserted"><ins><em>sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want</em></ins></span> to be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running on other devices in
+      range</strong></del></span> <span class="inserted"><ins><em>safe, we 
must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free</em></ins></span> so <span class="removed"><del><strong>as to 
determine</strong></del></span> <span class="inserted"><ins><em>we know it 
won't collect any of</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
+  &lt;li id="M201711230"&gt;
+    &lt;p&gt;AI-powered driving apps</em></ins></span> can
+      <span class="removed"><del><strong>correlate ads</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareInGames --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
-        to China&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars</em></ins></span> with <span 
class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>nonfree 
software are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
+    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>make changes in 
various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However,</em></ins></span> even if it 
<span class="removed"><del><strong>isn't a TV channel.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
-    when accessed through the modem.  However, even if it asked
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>asked
     for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span>
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>track the car's movements all the 
time;</em></ins></span>
-    it <span class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span class="inserted"><ins><em>physically 
remove</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements</em></ins></span> 
all the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>time;
+    it is possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>extract
+    data remotely</em></ins></span> and <span 
class="removed"><del><strong>would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>determine the 
car's location
+    at any time. (See Section 2, paragraphs b and c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders</em></ins></span> it to <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not to be trusted 
unless</strong></del></span> <span class="inserted"><ins><em>data and 
hand</em></ins></span> it <span class="removed"><del><strong>is done
+    by free</strong></del></span>
+    <span class="inserted"><ins><em>over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
-      companies.&lt;/p&gt;
+    &lt;p id="records-drivers"&gt;Proprietary</em></ins></span> software in 
<span class="removed"><del><strong>your own computer.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
-
-    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate the game play for specific players.&lt;/p&gt;
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that</strong></del></span> <span 
class="inserted"><ins><em>cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records</em></ins></span> information <span 
class="removed"><del><strong>will be transmitted</strong></del></span> <span 
class="inserted"><ins><em>about drivers' movements&lt;/a&gt;, which is made
+    available</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span> <span class="inserted"><ins><em>car 
manufacturers, insurance companies,</em></ins></span> and
+      <span class="removed"><del><strong>the switch to 
turn</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
 
-      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>matter of proprietary surveillance. These systems
+    &lt;p&gt;The case of toll-collection systems, mentioned 
in</em></ins></span> this <span class="removed"><del><strong>off has no effect. 
 (The fact that the
+      transmission reports a 404 error</strong></del></span> <span 
class="inserted"><ins><em>article,
+    is not</em></ins></span> really <span class="removed"><del><strong>means 
nothing;</strong></del></span> <span class="inserted"><ins><em>a matter of 
proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money 
-      can use</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done by malware. The
-    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;</em></ins></span>
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done by malware. The</em></ins></span>
+    other <span class="removed"><del><strong>devices</strong></del></span> 
<span class="inserted"><ins><em>cases mentioned are done by proprietary malware 
in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtRecreation 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtRecreation"&gt;Spyware at 
Recreation&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;</em></ins></span>
-  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareAtRecreation"&gt;#SpywareAtRecreation&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-       distributing a spyware app for its headphones&lt;/a&gt;.
-      Specifically, the app would record the names of the audio 
files</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require</em></ins></span>
-    users <span class="removed"><del><strong>listen</strong></del></span> to 
<span class="removed"><del><strong>along with the headphone's unique serial 
number.
-    &lt;/p&gt;
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of</strong></del></span> <span 
class="inserted"><ins><em>identify themselves to Facebook&lt;/a&gt;. This will 
give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
+    free rein to pervasively snoop</em></ins></span> on <span 
class="inserted"><ins><em>Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates</em></ins></span> the <span class="removed"><del><strong>app said 
that users gave consent</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>this,
-      would that make</strong></del></span> <span 
class="inserted"><ins><em>the most intimate
-    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
-      &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal</strong></del></span> <span 
class="inserted"><ins><em>takes</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>make this potential real &lt;a
-    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    creates</em></ins></span> the <span class="removed"><del><strong>user's 
local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>potential for the most intimate
+    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch</strong></del></span> <span 
class="inserted"><ins><em>takes</em></ins></span> to <span 
class="removed"><del><strong>stop this, but any product
+      could spy</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>potential real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>maximum 
possible
-    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    &lt;p&gt;You can bet Facebook will implement the maximum possible
+    surveillance</em></ins></span> on <span class="removed"><del><strong>what 
programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Oculus Rift devices. The moral is, never trust a VR
     system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareInGames 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
-   programs, so it
-   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance is an abuse all the <span 
class="removed"><del><strong>same.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;When</strong></del></span> <span 
class="inserted"><ins><em>same.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;In addition, many web sites spy on 
their visitors.  Web sites are not
+   programs, so it</em></ins></span>
+   &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data 
about</strong></del></span> <span 
class="inserted"><ins><em>call</em></ins></span> them <span 
class="removed"><del><strong>to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage to spy through</strong></del></span> <span 
class="inserted"><ins><em>surveillance is an abuse all the same.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
-    &lt;p&gt;As of April 2019, it is &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible to disable an
-    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
-    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
-    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
-    going to be based on Chromium.&lt;/p&gt;
+    &lt;p&gt;As of April 2019,</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
+    longer possible</em></ins></span> to <span 
class="removed"><del><strong>the 
+      internet&lt;/a&gt;&mdash; even what their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span> 
<span class="inserted"><ins><em>disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data about their</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports</em></ins></span>
+    users <span class="removed"><del><strong>and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier,</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> they <span 
class="removed"><del><strong>do it through ad networks that merge the data
+      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>follow ping links&lt;/a&gt; in Apple Safari, Google 
Chrome,
+    Opera, Microsoft Edge</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>also in the upcoming Microsoft Edge that is
+    going</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
+      for &ldquo;whales&rdquo; who can</strong></del></span> be <span 
class="removed"><del><strong>led to spend a lot of money. They 
+      also use</strong></del></span> <span class="inserted"><ins><em>based on 
Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    &lt;p&gt;Until 2015, any tweet that listed</em></ins></span> a <span 
class="removed"><del><strong>back door</strong></del></span> <span 
class="inserted"><ins><em>geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    sent the precise GPS location</em></ins></span> to <span 
class="removed"><del><strong>manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>Twitter's server&lt;/a&gt;. It still
     contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    on</em></ins></span> the <span class="removed"><del><strong>article 
describes gratis games, games</strong></del></span> <span 
class="inserted"><ins><em>reporters</em></ins></span> that <span 
class="removed"><del><strong>cost money 
+      can</strong></del></span> use <span class="removed"><del><strong>the 
same tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201701060"&gt;
-    &lt;p&gt;When</em></ins></span> a page uses Disqus
-    for comments, <span class="removed"><del><strong>&lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus 
software <span class="removed"><del><strong>loads</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</em></ins></span>
-    a Facebook software package into the browser of every anonymous visitor
-    to the page, and makes the page's URL available to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+&lt;!-- #SpywareAtRecreation --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtRecreation"&gt;Spyware at Recreation&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareAtRecreation"&gt;#SpywareAtRecreation&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Users are suing Bose for
+      &lt;a 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+       distributing</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701060"&gt;
+    &lt;p&gt;When</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>page uses Disqus</em></ins></span>
+    for <span class="removed"><del><strong>its headphones&lt;/a&gt;.
+      Specifically,</strong></del></span> <span 
class="inserted"><ins><em>comments,</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>proprietary Disqus software &lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>browser</em></ins></span> of <span 
class="inserted"><ins><em>every anonymous visitor
+    to</em></ins></span> the <span class="removed"><del><strong>audio files
+      users listen</strong></del></span> <span class="inserted"><ins><em>page, 
and makes the page's URL available</em></ins></span> to <span 
class="removed"><del><strong>along</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612064"&gt;
-    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
+    &lt;p&gt;Online sales,</em></ins></span> with <span 
class="inserted"><ins><em>tracking and surveillance of customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses to show different people different prices&lt;/a&gt;. Most of
-    the tracking is done by recording interactions with servers, but
+    businesses to show different people different prices&lt;/a&gt;. Most 
of</em></ins></span>
+    the <span class="removed"><del><strong>headphone's unique serial number.
+    &lt;/p&gt;
+    &lt;p&gt;The suit accuses that this was</strong></del></span> <span 
class="inserted"><ins><em>tracking is</em></ins></span> done <span 
class="removed"><del><strong>without</strong></del></span> <span 
class="inserted"><ins><em>by recording interactions with servers, but
     proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
+  &lt;li id="M201405140"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
-    data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Microsoft SkyDrive allows</em></ins></span> the <span 
class="inserted"><ins><em>NSA to directly examine</em></ins></span> users' 
<span class="removed"><del><strong>consent.
+      If</strong></del></span>
+    <span class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201210240"&gt;
-    &lt;p&gt;Many</em></ins></span> web sites rat their visitors to advertising
-    networks that track users.  Of the top 1000 web sites, &lt;a
+  &lt;li id="M201210240"&gt;
+    &lt;p&gt;Many web sites rat their visitors to advertising
+    networks that track users.  Of</em></ins></span> the <span 
class="removed"><del><strong>fine print</strong></del></span> <span 
class="inserted"><ins><em>top 1000 web sites, &lt;a
     
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    (as</em></ins></span> of <span class="inserted"><ins><em>5/17/2012) fed 
their visitors third-party cookies, allowing
     other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
-    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
-    to Google by using the Google Analytics service, which &lt;a
+  &lt;li id="M201208210"&gt;
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+      would</strong></del></span> <span class="inserted"><ins><em>Google 
Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tells Google the IP address and the page</em></ins></span> that <span 
class="removed"><del><strong>make it acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
-    &lt;p&gt;Many</em></ins></span> web sites try to collect users' address 
books (the user's list
+  &lt;li id="M201200000"&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
     of other people's phone numbers or email addresses).  This violates
     the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows the NSA</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
-    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
-    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track visitors to those pages&lt;/a&gt;&mdash;even 
users
+  &lt;li id="M201110040"&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+       illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>design the app</strong></del></span> <span 
class="inserted"><ins><em>track visitors</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>those 
pages&lt;/a&gt;&mdash;even users
     that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInFlash"&gt;Spyware in 
JavaScript and Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+&lt;p&gt;In addition, many</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
-    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a
-    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+    to snoop</em></ins></span> on <span class="inserted"><ins><em>information 
that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn</em></ins></span> their 
<span class="removed"><del><strong>visitors.  Web sites</strong></del></span> 
<span class="inserted"><ins><em>identity. Some</em></ins></span> are <span 
class="removed"><del><strong>not
+   programs, so it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance is an abuse all the same.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;When a page uses Disqus</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt;</em></ins></span> for
+  <span class="removed"><del><strong>comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
+  proprietary Disqus software loads a Facebook software package into
+  the browser</strong></del></span> <span 
class="inserted"><ins><em>this.&lt;/p&gt;
+
+    &lt;p&gt;The chat facilities</em></ins></span> of <span 
class="removed"><del><strong>every anonymous visitor to the page, and 
makes</strong></del></span> <span class="inserted"><ins><em>some customer 
services use</em></ins></span> the
+  <span class="removed"><del><strong>page's URL available to 
Facebook&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;The chat facilities of some customer services use the same sort of
-    malware to &lt;a
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking and 
surveillance</strong></del></span> <span class="inserted"><ins><em>same 
sort</em></ins></span> of <span class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+      businesses</strong></del></span>
+    <span class="inserted"><ins><em>malware</em></ins></span> to <span 
class="removed"><del><strong>show different people different prices&lt;/a&gt;. 
Most
+      of</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+    read what</em></ins></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>done by recording interactions with
+      servers, but proprietary software 
contributes.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807190"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
-    its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript on its web site to give other companies personal 
data</em></ins></span> on <span 
class="removed"><del><strong>users.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>its 
customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201712300"&gt;</em></ins></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Pages</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201712300"&gt;
     &lt;p&gt;Some JavaScript malware &lt;a
     
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711150"&gt;</em></ins></span>
+  &lt;li id="M201711150"&gt;
     &lt;p&gt;Some websites send
     JavaScript code to collect all the user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    &lt;p&gt;If you use LibreJS, it will block</em></ins></span> that <span 
class="removed"><del><strong>contain &ldquo;Like&rdquo; 
buttons</strong></del></span> <span class="inserted"><ins><em>malicious 
JavaScript
     code.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites 
use</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3665,96 +3574,166 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
-    &lt;p&gt;Flash and</em></ins></span> JavaScript <span 
class="removed"><del><strong>code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a form but not
-    sent&lt;/a&gt;, in order to learn their identity. 
Some</strong></del></span> are <span class="removed"><del><strong>&lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> for <span 
class="removed"><del><strong>this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Flash and JavaScript are used for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook to track visitors</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
+      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>identify users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
-    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
+    &lt;p&gt;Flash Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash and JavaScript 
are also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;
+    cookie feature helps</em></ins></span> web sites <span 
class="removed"><del><strong>rat their visitors to advertising networks 
that</strong></del></span> track
+      <span class="removed"><del><strong>users.  Of the top 1000 web 
sites,</strong></del></span> <span 
class="inserted"><ins><em>visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;</em></ins></span>
-
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201906220"&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome <span 
class="inserted"><ins><em>is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
-       spies on browser history, affiliations&lt;/a&gt;,</strong></del></span>
+    &lt;p&gt;Google Chrome is an</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers</em></ins></span> and <span 
class="removed"><del><strong>other installed software.
-    &lt;/p&gt;
+    instrument</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade
+    users' computers and report the</em></ins></span> sites <span 
class="inserted"><ins><em>they visit</em></ins></span> to <span 
class="removed"><del><strong>track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains</strong></del></span> <span 
class="inserted"><ins><em>report the sites they visit to advertising and
-    data companies, first of all to Google. Moreover, if users 
have</em></ins></span> a <span class="removed"><del><strong>key logger 
that</strong></del></span>
-    <span class="inserted"><ins><em>Gmail account, Chrome automatically logs 
them in to the browser for
+
+  &lt;li&gt;&lt;p&gt;Many web sites report</strong></del></span> <span 
class="inserted"><ins><em>advertising and
+    data companies, first of</em></ins></span> all <span 
class="removed"><del><strong>their visitors</strong></del></span> to <span 
class="removed"><del><strong>Google by using</strong></del></span> <span 
class="inserted"><ins><em>Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to</em></ins></span> the 
<span class="removed"><del><strong>Google Analytics service, 
which</strong></del></span> <span class="inserted"><ins><em>browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way to escape surveillance is to switch 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL typed in&lt;/a&gt;, one key 
at</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span>
 a <span class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>modified version of Firefox
-    with several changes to protect users' privacy.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The best way to escape surveillance is to switch 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a 
modified version of Firefox
+    with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome includes 
a module</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+  &lt;li id="M201704131"&gt;
     &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
     href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
-    of transparency on the part of both the educational services and the
-    schools, the difficulty of opting out of these services, and the lack
-    of proper privacy policies, among other things.&lt;/p&gt;
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>lack
+    of transparency on the part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
+      user's list</strong></del></span>
+    <span class="inserted"><ins><em>schools, the difficulty</em></ins></span> 
of <span class="removed"><del><strong>other people's phone numbers or email 
addresses).
+      This violates</strong></del></span> <span 
class="inserted"><ins><em>opting out of these services, and</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
+    of <span class="removed"><del><strong>those</strong></del></span> <span 
class="inserted"><ins><em>proper privacy policies, among</em></ins></span> 
other <span class="removed"><del><strong>people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
 
     &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize</em></ins></span> that <span class="inserted"><ins><em>the 
software Google uses to spy on students is
+    should realize that</em></ins></span> the <span 
class="removed"><del><strong>NSA to directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software Google uses</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware in JavaScript and Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Some websites send JavaScript code</strong></del></span> <span 
class="inserted"><ins><em>students is
     nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt; for both 
education</em></ins></span> and <span class="removed"><del><strong>transmits 
audio</strong></del></span> <span class="inserted"><ins><em>school
-    administration. If the school is run locally, parents and teachers
-    can mandate their representatives at the School Board</em></ins></span> to 
<span class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>refuse the
-    budget unless the school initiates a switch to free software. If
+    to persuade school officials</em></ins></span> to <span 
class="removed"><del><strong>collect all the user's
+    input,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and 
teachers</em></ins></span>
+    can <span class="removed"><del><strong>then
+        be used to reproduce</strong></del></span> <span 
class="inserted"><ins><em>mandate their representatives at</em></ins></span> 
the <span class="removed"><del><strong>whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
 <span class="inserted"><ins><em>School Board</em></ins></span> to <span 
class="removed"><del><strong>snoop on information that users have typed 
into</strong></del></span> <span class="inserted"><ins><em>refuse the
+    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>form but not
+    sent&lt;/a&gt;, in order</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>learn their identity. Some are &lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software. If
     education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
     etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash 
Player's</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
+    &lt;p&gt;Google Chrome makes it easy for an extension to 
do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for</strong></del></span> 
<span class="inserted"><ins><em>many of them do so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
+    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    spies on browser history, affiliations&lt;/a&gt;, and other installed 
<span class="removed"><del><strong>software.
+    &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200809060"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome contains a key logger that &lt;a 
<span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;</em></ins></span>
+    sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome includes 
a module that
+      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareInDrones --&gt;
@@ -3766,27 +3745,9 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;While you're using</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
-    &lt;p&gt;Google Chrome includes</em></ins></span> a <span 
class="removed"><del><strong>DJI drone</strong></del></span> <span 
class="inserted"><ins><em>module that &lt;a
-    
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>its servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201308040"&gt;
-    &lt;p&gt;Google Chrome &lt;a
-    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
-    spies</em></ins></span> on <span class="inserted"><ins><em>browser 
history, affiliations&lt;/a&gt;, and</em></ins></span> other <span 
class="removed"><del><strong>people, DJI is in many
-      cases</strong></del></span> <span class="inserted"><ins><em>installed
-    software.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M200809060"&gt;
-    &lt;p&gt;Google Chrome contains a key logger that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-    sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI is 
in many
+      cases &lt;a 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
@@ -3802,20 +3763,26 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
-      &ldquo;their&rdquo; phones is</strong></del></span>
+      &ldquo;their&rdquo; phones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905281"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order</em></ins></span> to 
<span class="removed"><del><strong>make sure they can't &ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will</strong></del></span> be able to <span 
class="removed"><del><strong>listen for speech all</strong></del></span> <span 
class="inserted"><ins><em>create an account on</em></ins></span>
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world</em></ins></span> is <span 
class="inserted"><ins><em>still
+    struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing</em></ins></span> proprietary <span 
class="removed"><del><strong>software to make sure they can't 
&ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905281"&gt;
+    &lt;p&gt;Microsoft &lt;a
+    
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
+    people to give their phone number&lt;/a&gt; in order to</em></ins></span> 
be able to <span class="removed"><del><strong>listen for speech 
all</strong></del></span> <span class="inserted"><ins><em>create an account 
on</em></ins></span>
     the <span class="removed"><del><strong>time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3922,7 +3889,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 2017, 
2018</strong></del></span> <span 
class="inserted"><ins><em>2015-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 2017, 
2018</strong></del></span> <span 
class="inserted"><ins><em>2015-2021</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -3933,7 +3900,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/30 10:33:46 $
+$Date: 2021/01/04 10:03:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.364
retrieving revision 1.365
diff -u -b -r1.364 -r1.365
--- proprietary-surveillance.de.po      30 Dec 2020 10:33:46 -0000      1.364
+++ proprietary-surveillance.de.po      4 Jan 2021 10:03:02 -0000       1.365
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5680,6 +5680,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5894,10 +5902,10 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2015-] {+2015-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-surveillance.es.po      31 Dec 2020 10:35:47 -0000      1.124
+++ proprietary-surveillance.es.po      4 Jan 2021 10:03:02 -0000       1.125
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-12-31 11:19+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -5139,6 +5140,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5259,7 +5268,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.580
retrieving revision 1.581
diff -u -b -r1.580 -r1.581
--- proprietary-surveillance.fr.po      30 Dec 2020 23:17:20 -0000      1.580
+++ proprietary-surveillance.fr.po      4 Jan 2021 10:03:02 -0000       1.581
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-12-30 12:46+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -5153,6 +5154,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5267,7 +5276,10 @@
 "infos nécessaires."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.it-diff.html       30 Dec 2020 10:33:46 -0000      
1.217
+++ proprietary-surveillance.it-diff.html       4 Jan 2021 10:03:02 -0000       
1.218
@@ -588,12 +588,17 @@
   but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
     sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
   &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not really clean since &lt;a
     href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
-    own malware&lt;/a&gt;.&lt;/p&gt;
+    own malware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -611,33 +616,51 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006260"&gt;
     &lt;p&gt;Most apps are malware, but
-    Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on users as well
+    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop</em></ins></span> on 
<span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps,</strong></del></span> users <span 
class="removed"><del><strong>could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says that Biden's app has a less manipulative overall
-    approach, but that does not tell us whether it has functionalities we
+    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
+    approach, but</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>does not tell us whether it has functionalities we
     consider malicious, such as sending data the user has not explicitly
-    asked to send.&lt;/p&gt;
+    asked to send.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601110"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make 
sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
     &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude</strong></del></span> <span 
class="inserted"><ins><em>take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
-    retrieve geo-location data from the GPS, take photographs, read
+    them</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>turn the 
phones on and off, listen</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed to disguise itself
+    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -646,21 +669,41 @@
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There are &lt;a
+    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>does not 
operate via</em></ins></span>
+    the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
+    phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS &lt;a
-    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
+    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
+    yet another example of nonfree software pretending</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -670,27 +713,38 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009183"&gt;
-    &lt;p&gt;Facebook &lt;a
-    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
-    camera.&lt;/p&gt;
+    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>by 
surreptitously turning on the device's
+    camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202004200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202004200"&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice of surreptitiously activating the Siri software to &lt;a
-    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
-    record users' conversations when they had not activated Siri&lt;/a&gt;.
-    This was not just occasional, it was systematic practice.&lt;/p&gt;
+    made a practice of surreptitiously activating</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>Siri software 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had</em></ins></span> not <span 
class="removed"><del><strong>have described these apps as
+  &ldquo;free&rdquo;&mdash;they are</strong></del></span> <span 
class="inserted"><ins><em>activated Siri&lt;/a&gt;.
+    This was</em></ins></span> not <span class="removed"><del><strong>free 
software.  The clear way</strong></del></span> <span 
class="inserted"><ins><em>just occasional, it was systematic practice.&lt;/p&gt;
 
-    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listen to these recordings, in a group that made
     transcripts of them. He does not believes that Apple has ceased this
-    practice.&lt;/p&gt;
+    practice.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The only reliable way to prevent this is, for the program that
-    controls access to the microphone to decide when the user has
+    &lt;p&gt;The <span class="removed"><del><strong>article 
takes</strong></del></span> <span class="inserted"><ins><em>only reliable way 
to prevent this is,</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but is</strong></del></span> <span 
class="inserted"><ins><em>program</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no 
right</strong></del></span>
+    <span class="inserted"><ins><em>controls access</em></ins></span> to
+  <span class="removed"><del><strong>analyze what</strong></del></span> <span 
class="inserted"><ins><em>the microphone to decide when the user has
     &ldquo;activated&rdquo; any service, to be free software, and the
-    operating system under it free as well. This way, users could make
+    operating system under it free as well. This way,</em></ins></span> users 
<span class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>could make
     sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -698,35 +752,73 @@
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
     sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    Browsing service&lt;/a&gt;, to check URLs</em></ins></span> that <span 
class="removed"><del><strong>snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
     with the Chinese government, its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+    dissenters in China and Hong Kong, thus endangering their 
lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis 
Android</strong></del></span>
 
-  &lt;li id="M201905280"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>(but not</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
-    Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
+    Channel (owned by IBM),</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    and DoorDash. But it</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are 
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most 
nonfree apps contain
+    trackers.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>of these</em></ins></span> send <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>personally identifying</em></ins></span> data <span 
class="removed"><del><strong>to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package</strong></del></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201711250"&gt;
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
     &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    illegal</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy</em></ins></span> on 
<span class="removed"><del><strong>Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -740,34 +832,53 @@
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes &lt;a
+    &lt;p&gt;Apple</em></ins></span> proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
+      &mdash; which</strong></del></span> <span 
class="inserted"><ins><em>screen&lt;/a&gt;&mdash;which</em></ins></span> would 
mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether the phone is snooping on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+    &lt;p&gt;The</em></ins></span> iMessage app on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
     a server every phone number that the user types into it&lt;/a&gt;; the
     server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving the code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
     take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+    make are automatically updated everywhere. <span 
class="removed"><del><strong>[...]</strong></del></span> <span 
class="inserted"><ins><em>[&hellip;]</em></ins></span> 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
@@ -783,8 +894,11 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
@@ -803,19 +917,21 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the &lt;a
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    &lt;p&gt;The &lt;a</em></ins></span> class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201312300"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
     Either Apple helps the NSA snoop on all the data in an iThing, or it
@@ -830,54 +946,96 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
+    to <span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M202012070"&gt;
-    &lt;p&gt;Baidu apps were &lt;a
-    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;caught
 collecting
-    sensitive personal data&lt;/a&gt; that can be used for lifetime tracking
-    of users and putting them in danger. More than 1.4 billion people
-    worldwide are affected by these proprietary apps and users'
-    privacy is jeopardized by this surveillance tool. Data collected by Baidu 
may be shared with Chinese government, possibly putting Chinese people in 
danger.&lt;/p&gt;
-  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
 
-  &lt;li id="M202004300"&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202012070"&gt;
+    &lt;p&gt;Baidu apps were</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;caught
 collecting
+    sensitive personal data&lt;/a&gt; that</em></ins></span> can <span 
class="removed"><del><strong>take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the phones
+      on and off, listen to the microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>be used for 
lifetime tracking
+    of users</em></ins></span> and <span class="removed"><del><strong>web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>putting them in danger. More than 1.4 billion people
+    worldwide are affected by these proprietary apps</em></ins></span> and 
<span class="removed"><del><strong>read the contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>users'
+    privacy</em></ins></span> is <span class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>jeopardized by this surveillance tool. Data 
collected by Baidu may be shared with Chinese government, possibly putting 
Chinese people in danger.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202004300"&gt;
+    &lt;p&gt;Xiaomi</em></ins></span> phones <span 
class="removed"><del><strong>come with</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
     many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
+    visiting a website, listening to a song.  They</em></ins></span> send 
<span class="removed"><del><strong>so much data that their transmission 
is</strong></del></span> <span class="inserted"><ins><em>device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
+    other streaming dis-services make</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested by the</strong></del></span> <span 
class="inserted"><ins><em>dossier about each</em></ins></span> user, <span 
class="removed"><del><strong>clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make
     users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
+    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>same wrongs when the culprits are not Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201812060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows?</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
@@ -932,49 +1090,116 @@
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
+    &lt;p&gt;Spyware in Android phones (and Windows?</em></ins></span> 
laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
+      the use of data on the user's computer, but it does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, 
judging</strong></del></span> <span class="inserted"><ins><em>some Android 
devices when they are
+    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
+    by <span class="inserted"><ins><em>Google, use a modified version of 
Android that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends</em></ins></span> personal data <span 
class="removed"><del><strong>in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>personal details 
of users that install</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>spyware</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> not <span class="removed"><del><strong>only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>enough to
     legitimize actions like this.  At this point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>users, instead</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span>
+    <span class="inserted"><ins><em>hiding it</em></ins></span> in <span 
class="removed"><del><strong>the phone,</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</em></ins></span>
+    and <span class="inserted"><ins><em>other companies from getting this 
personal information</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general</em></ins></span> surveillance <span 
class="removed"><del><strong>software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various 
sites</strong></del></span> <span 
class="inserted"><ins><em>package</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -986,25 +1211,42 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
-    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;
+    the e-reader used by most US libraries,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span class="removed"><del><strong>who
+      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -1023,37 +1265,62 @@
   &lt;li id="M202011260"&gt;
     &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
     
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After
-    a public outburst, Microsoft stated that &lt;a
-    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    snoop</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>each 
employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912190"&gt;
-    &lt;p&gt;Some Avast and AVG extensions
+    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting to realize</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
     for Firefox and Chrome were found to &lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
     snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
     removed the problematic extensions from their stores, but this shows
-    once more how unsafe nonfree software can be. Tools that are supposed
-    to protect a proprietary system are, instead, infecting it with
-    additional malware (the system itself being the original 
malware).&lt;/p&gt;
+    once more how unsafe nonfree software can be. Tools</em></ins></span> that 
<span class="inserted"><ins><em>are supposed
+    to protect a proprietary system are, instead, infecting</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>with
+    additional malware (the system itself being</em></ins></span> the <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who</em></ins></span> is <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>typical 
example</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot</em></ins></span> of
+      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    &lt;p&gt;The fact that this is used for repression</em></ins></span> of 
<span class="removed"><del><strong>the proprietary</strong></del></span> <span 
class="inserted"><ins><em>forbidden sharing
     makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;This illustrates that making unauthorized copies of 
nonfree</em></ins></span> software <span class="removed"><del><strong>industry 
towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    is <span class="removed"><del><strong>doing this in</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1062,65 +1329,119 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202003260"&gt;
-    &lt;p&gt;The Apple iOS version of Zoom &lt;a
-    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
-    a Facebook account. According to the article, Zoom and Facebook
+    &lt;p&gt;The Apple iOS version of Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if</em></ins></span> the 
<span class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>user doesn't have
+    a Facebook account. According to</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>article, Zoom</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Facebook
     don't even mention this surveillance on their privacy policy page,
-    making this an obvious violation of people's privacy even in their
+    making this an obvious violation</em></ins></span> of <span 
class="inserted"><ins><em>people's privacy even in their
     own terms.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202003010"&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
+    estimates</em></ins></span> whether the <span 
class="inserted"><ins><em>user has Covid-19 and &lt;a
     
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
     tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
-    &lt;p&gt;The Amazon Ring app does &lt;a
-    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon Ring</em></ins></span> app <span 
class="removed"><del><strong>developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance</em></ins></span> for <span class="removed"><del><strong>use 
by companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201912220"&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
+  &lt;li id="M201912220"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked the user to
+      approve sending personal data to the</strong></del></span> <span 
class="inserted"><ins><em>ToToc messaging</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>seems</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
<span class="inserted"><ins><em>be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that is a good
-    reason to use free software instead.&lt;/p&gt;
+    spying tool for</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and that is</em></ins></span> a 
<span class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>good
+    reason</em></ins></span> to <span class="removed"><del><strong>anyone?  
A</strong></del></span> <span class="inserted"><ins><em>use</em></ins></span> 
free software <span class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+    <span class="inserted"><ins><em>the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping</em></ins></span> and <span class="removed"><del><strong>then 
sends personal data about them</strong></del></span> <span 
class="inserted"><ins><em>sabotage capabilities&lt;/a&gt; if they install their 
own
+    software on the device.  Many employers demand</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
+    employee, this is simply nonfree software, as fundamentally 
unjust</em></ins></span>
+    and <span class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
+    the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>grant</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company 
based</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish</em></ins></span> in the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span> a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
     saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
+    of the app,</em></ins></span> and <span class="inserted"><ins><em>that, 
according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
@@ -1128,53 +1449,80 @@
   &lt;li id="M201909091"&gt;
     &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
+    tracks users</em></ins></span> even <span 
class="removed"><del><strong>speak</strong></del></span> <span 
class="inserted"><ins><em>when it is turned off&lt;/a&gt;, after tricking 
them</em></ins></span>
+    into <span class="inserted"><ins><em>giving</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
     send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of all the 10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Keeping track of who downloads a</em></ins></span> proprietary 
<span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature</strong></del></span>
+    <span class="inserted"><ins><em>program is a form</em></ins></span> of 
<span class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>surveillance.  There 
is</em></ins></span> a <span class="removed"><del><strong>person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span>
+    <span class="inserted"><ins><em>proprietary program for 
adjusting</em></ins></span> a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>certain telescopic rifle sight.</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or 
more</em></ins></span> people <span 
class="removed"><del><strong>used</strong></del></span>
+    <span class="inserted"><ins><em>who have installed</em></ins></span> 
it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list of who has installed
+    <span class="removed"><del><strong>&lt;p&gt;The company's statement that 
it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold the data 
to</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;With</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data 
broker</strong></del></span> <span class="inserted"><ins><em>free program 
there</em></ins></span> would <span class="removed"><del><strong>have been able 
to figure out</strong></del></span> <span class="inserted"><ins><em>not be a 
list of</em></ins></span> who <span class="removed"><del><strong>the user 
was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company</strong></del></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>pay a 
total</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of the operating system, in order to gather as much private data as
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
+    of <span class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>the operating system, in 
order</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
@@ -1183,10 +1531,10 @@
   &lt;/li&gt;
 
   &lt;li id="M201905060"&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+    requirement</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>run a proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span 
class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
 
     &lt;p&gt;This app is a spyware that can snoop on a lot of
     sensitive data, including user's location and contact list, and has &lt;a
@@ -1195,69 +1543,163 @@
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    &lt;p&gt;Data</em></ins></span> collected by <span 
class="removed"><del><strong>the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>menstrual and pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
+    available to employers</em></ins></span> and <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>the woman who uses 
the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span class="inserted"><ins><em>equal 
employment</em></ins></span>
+    and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>do so. A
     free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    spying</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>you 
is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
+    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>new 
one</em></ins></span> is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>being 
developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the phone has</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>location data to 
Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="removed"><del><strong>Parliament
+  this way, because they</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    the data, or</em></ins></span> pass it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access to
+    the network but no direct access to the data. This 
results</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>massive
+    surveillance on which the user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against 
people</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>poor
+    medical condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
@@ -1684,103 +2126,36 @@
 
     &lt;p&gt;The article confusingly describes gratis apps as
     &ldquo;free&rdquo;, but most of them are not in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also 
uses</em></ins></span> the
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
     is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
-to legitimize actions like this.  At this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
-
+  &lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;More than 73% of the most popular</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>location information&lt;/a&gt; of 
their users with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on the 
average.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
+  &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</em></ins></span> to
-    the <span class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>snooping done by 
the phone company, and perhaps by the OS</em></ins></span> in
-    the <span class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>phone.&lt;/p&gt;
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users</em></ins></span> to say
-  <span class="removed"><del><strong>&ldquo;zero 
price&rdquo;</strong></del></span> <span class="inserted"><ins><em>&ldquo;I 
agree&rdquo;. That</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>no excuse</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span>
-    <span class="inserted"><ins><em>malware.&lt;/p&gt;
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
-    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
-    is <span class="removed"><del><strong>that valid?  Software developers 
have no right to
-  analyze what users are</strong></del></span> doing <span 
class="removed"><del><strong>or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>this in a 
way</em></ins></span> that <span class="removed"><del><strong>snoop are
-  just</strong></del></span> <span class="inserted"><ins><em>at least is 
visible and optional&lt;/a&gt;. Not</em></ins></span>
-    as <span class="removed"><del><strong>wrong</strong></del></span> <span 
class="inserted"><ins><em>bad</em></ins></span> as <span 
class="removed"><del><strong>any</strong></del></span> <span 
class="inserted"><ins><em>what the others do.&lt;/p&gt;
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
@@ -1793,59 +2168,37 @@
     &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
     use of data on the user's computer, but it does surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it tries to get the user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+  &lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
     approve sending personal data to the app developer but did not ask
-    about sending it</em></ins></span> to <span 
class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>other 
companies.  This shows</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>weakness of
-    the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
-    <span class="inserted"><ins><em>surveillance: why should a flashlight 
app</em></ins></span> send <span class="removed"><del><strong>personal 
data</strong></del></span> <span class="inserted"><ins><em>any 
information</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    surveillance: why should a flashlight app send any information to
+    anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;p&gt;Skype refuses to say whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
@@ -1861,169 +2214,93 @@
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the 
phone</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202010221"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>snooping</strong></del></span> <span 
class="inserted"><ins><em>imposing its
-    surveillance</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span class="inserted"><ins><em>the 
game</em></ins></span> of <span class="removed"><del><strong>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring</em></ins></span>
-    every <span class="removed"><del><strong>phone number 
that</strong></del></span> <span class="inserted"><ins><em>player to open an 
account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought</em></ins></span> the <span class="removed"><del><strong>user 
types</strong></del></span> <span class="inserted"><ins><em>game and will merge 
all accounts</em></ins></span> into <span 
class="removed"><del><strong>it&lt;/a&gt;; the server records these numbers for 
at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its network,
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
     software, meaning it respects the user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;</em></ins></span>
+    it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201908210"&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;</em></ins></span>
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
+  &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users 
with</strong></del></span> <span class="inserted"><ins><em>sends it 
to</em></ins></span> third <span 
class="removed"><del><strong>parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
+  &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> the 
<span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>massive
+    program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on all <span 
class="removed"><del><strong>your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed</strong></del></span> <span 
class="inserted"><ins><em>open processes running</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud feature 
is</strong></del></span> <span class="inserted"><ins><em>its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
     information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to</em></ins></span> 
the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is a <span 
class="removed"><del><strong>way to</strong></del></span> <span 
class="inserted"><ins><em>computer, and you can't trust a computer with
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>wide range</em></ins></span> of <span 
class="inserted"><ins><em>data about their users and their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use</em></ins></span> this <span 
class="inserted"><ins><em>data</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span> <span 
class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>buy things, and hunt for
-    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>access any</strong></del></span> <span 
class="inserted"><ins><em>be led to spend a lot</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>money. They</em></ins></span> also
-    <span class="inserted"><ins><em>use</em></ins></span> a <span 
class="removed"><del><strong>feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That</strong></del></span> <span 
class="inserted"><ins><em>manipulate the game play for specific 
players.&lt;/p&gt;
-
-    &lt;p&gt;While the</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span class="inserted"><ins><em>describes gratis 
games, games</em></ins></span> that <span class="inserted"><ins><em>cost 
money</em></ins></span>
-    can <span class="removed"><del><strong>be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>use the same tactics.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies</em></ins></span> for <span class="removed"><del><strong>the 
state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>companies, and</em></ins></span> the NSA <span 
class="removed"><del><strong>snoop on all the data in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>takes advantage
-    to spy through</em></ins></span> it <span 
class="inserted"><ins><em>too&lt;/a&gt;.  Here's information on &lt;a
+  &lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2033,17 +2310,14 @@
   &lt;/li&gt;
 
   &lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="removed"><del><strong>totally 
incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a hidden
+    &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -2055,319 +2329,171 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>snoop on the people 
that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that the article uses</em></ins></span> 
the <span class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>turn the phones
-      on</strong></del></span> <span 
class="inserted"><ins><em>me</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202006250"&gt;
     &lt;p&gt;TV manufacturers are able to &lt;a
     
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>user is watching&lt;/a&gt;.</em></ins></span> This 
<span class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>illegal due</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by</strong></del></span>
-    the <span class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>Video Privacy 
Protection Act</em></ins></span> of <span class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>1988, but they're circumventing
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>own words 
of</em></ins></span> the <span class="removed"><del><strong>GPS and microphone 
in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>company's
-    CTO,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect</strong></del></span> this <span 
class="removed"><del><strong>means Windows laptops.)  
Here</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
-      remote command</strong></del></span> <span 
class="inserted"><ins><em>sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says</strong></del></span> <span 
class="inserted"><ins><em>slightly
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
     &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that</em></ins></span> it <span class="removed"><del><strong>will 
eventually require</strong></del></span> <span class="inserted"><ins><em>is 
opt-in in newer models. But since the Vizio software is
+    is that it is opt-in in newer models. But since the Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that</em></ins></span> all <span 
class="removed"><del><strong>new portable phones</strong></del></span> <span 
class="inserted"><ins><em>future updates will leave the
+    and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>make sure it 
isn't spying on you</em></ins></span> is
-    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="inserted"><ins><em>Internet, and</em></ins></span> use <span 
class="removed"><del><strong>of data on the user's computer, but it does 
surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span class="inserted"><ins><em>a 
terrestrial antenna
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to get <span 
class="removed"><del><strong>the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>your own router (which can
+    if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>do lots 
of surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>block connections</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It</em></ins></span>
-    is <span class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before</strong></del></span> <span 
class="inserted"><ins><em>too bad that</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The 
Netflix</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in the 
phone,</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
-    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
-        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
-    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
-    sounds to be picked up by proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
-    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+    manufacturers in spying on their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>company
-    already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>unaware 
they're
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
-    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps the user has
-    installed.</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
-    used <span class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to 
make its TVs snoop on what
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the 
phone</strong></del></span> <span 
class="inserted"><ins><em>another</em></ins></span> company, <span 
class="inserted"><ins><em>Nuance&lt;/a&gt;.
-    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>US 
or some
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span 
class="removed"><del><strong>the question of whether the app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>third
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014, but we don't expect</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to
-      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>get users' formal
-    consent before collecting</em></ins></span> personal data <span 
class="inserted"><ins><em>are totally inadequate.
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>TV will</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
-    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
@@ -2376,50 +2502,41 @@
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
@@ -2428,304 +2545,147 @@
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>look at what's in the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see</em></ins></span> through <span class="removed"><del><strong>it 
too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>your camera.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-<span class="removed"><del><strong>&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
-    into <span class="inserted"><ins><em>one.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;</em></ins></span>
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
-
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
-
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have <span class="removed"><del><strong>been 
able to figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>been able to figure out who</em></ins></span> the 
<span class="removed"><del><strong>emails of members of 
Parliament</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201511250"&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the manufacturer <span 
class="removed"><del><strong>is using it</strong></del></span> <span 
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and</em></ins></span> even 
<span class="removed"><del><strong>which page</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M202009270"&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009270"&gt;
     &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil</em></ins></span> and <span class="removed"><del><strong>make 
changes</strong></del></span> <span class="inserted"><ins><em>monitor staff 
working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is</em></ins></span> in <span 
class="removed"><del><strong>various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>effect a malicious
+    software, including videoconference software, to &lt;a
+    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2733,279 +2693,284 @@
     &lt;p&gt;Google Nest &lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
-    update</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>its speaker 
devices using their back door &lt;a
+    update to its speaker devices using their back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm is happening. This means</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>devices now listen for more
-    than just their wake words. Google says</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>software update was sent
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
     out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>to customers who pay</em></ins></span> for
-    <span class="removed"><del><strong>authentication, you couldn't be 
confident</strong></del></span> <span class="inserted"><ins><em>it.&lt;/p&gt;
+    this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>bosses &lt;a
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing</em></ins></span> in <span 
class="inserted"><ins><em>their own computers&lt;/a&gt;, so</em></ins></span> 
the <span class="removed"><del><strong>car</strong></del></span>
-    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span class="inserted"><ins><em>not
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
     most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
-    modem enables the phone company to track</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and snoop 
on</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>household
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not be 
sufficient</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span class="inserted"><ins><em>carry
-    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>devices implemented proper
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it</em></ins></span> is <span class="removed"><del><strong>made 
available</strong></del></span> <span class="inserted"><ins><em>not 
supposed</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>listen&lt;/a&gt;. Thus, when one</em></ins></span> of 
<span class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
-      really</strong></del></span> <span class="inserted"><ins><em>Google's
-    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
+  &lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses</em></ins></span> 
proprietary <span class="removed"><del><strong>malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    way to see or control what it records or sends.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>software, there is no
-    way</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
-      determine the car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>see or control 
what</em></ins></span> it <span class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    &lt;p&gt;Data collected by devices such as the Nest 
thermostat,</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Philips
+    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers</strong></del></span> send <span 
class="removed"><del><strong>&lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ 
garage opener</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
+    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without</em></ins></span> a <span 
class="removed"><del><strong>woman came up to me</strong></del></span> <span 
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse,</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain</em></ins></span> on <span 
class="removed"><del><strong>them,</strong></del></span> <span 
class="inserted"><ins><em>other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>cable&lt;/a&gt;. Even 
if</strong></del></span> the <span class="removed"><del><strong>image is coming 
from</strong></del></span> <span class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
-    the <span class="removed"><del><strong>TV reports what it is. The 
existence of a way</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they are made 
available</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home,</em></ins></span> not <span class="removed"><del><strong>hidden 
as it was</strong></del></span> <span 
class="inserted"><ins><em>only</em></ins></span> in
-    <span class="removed"><del><strong>these TVs, does not 
legitimize</strong></del></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As a result, 
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell 
phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>the Alexa service 
staff even</em></ins></span> has <span class="removed"><del><strong>got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-      consent before collecting</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other</em></ins></span> personal <span 
class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and</em></ins></span> data 
<span class="removed"><del><strong>are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>processing is 
done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know</em></ins></span> what happens <span 
class="removed"><del><strong>if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent</strong></del></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
-    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
-    paid for.&lt;/p&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
+    paying for the subscription,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
-    specific cases, it spies</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
-    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    paid for.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be in
-    working order.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
-    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
+      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would</em></ins></span> be
-      <span class="removed"><del><strong>picked up by proprietary malware 
running on other devices in
-      range so</strong></del></span> <span class="inserted"><ins><em>much
-    easier for Amazon. And if some government such</em></ins></span> as <span 
class="inserted"><ins><em>China or the US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell the product 
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.  
Once your
-      Internet devices</strong></del></span> <span 
class="inserted"><ins><em>country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers</em></ins></span> are <span 
class="removed"><del><strong>paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>probably 
hackers too, but please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gratis 
electronic toothbrush that snoops on its user by
-    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house,</em></ins></span> all the 
time&lt;/a&gt;.&lt;/p&gt;
-
-    <span class="inserted"><ins><em>&lt;p&gt;Today's technological practice 
does not include any way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
+  &lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially 
spying</em></ins></span>
+    on <span class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped, it could be saving up 
records
+    about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201310260"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing &lt;a
-    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence of a 
way</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="removed"><del><strong>was in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>normal</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And</strong></del></span> <span class="inserted"><ins><em>companies
+    monitor every aspect of</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3016,31 +2981,52 @@
   &lt;li id="M202009100"&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they</em></ins></span> have <span 
class="inserted"><ins><em>a lot of security flaws. They &lt;a
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people)</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
+    permit security breakers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt;</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>and from the watch, possibly 
endangering</em></ins></span> the <span class="removed"><del><strong>user 
watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
 
-  &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
+    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and to transmit conversations
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else</em></ins></span> 
and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3055,195 +3041,203 @@
   &lt;li id="M202008181"&gt;
     &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data</em></ins></span> to <span class="removed"><del><strong>the US 
or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>AWS</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
-    by</strong></del></span> <span class="inserted"><ins><em>help create 
custom insurance premiums&lt;/a&gt;
+    upload data</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>AWS to help 
create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
-    disconnect its cellular antenna and its GPS antenna.  If you want
-    GPS navigation, get a separate navigator which runs</em></ins></span> free 
software <span class="removed"><del><strong>in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that</strong></del></span>
-    <span class="inserted"><ins><em>and works with Open Street Map.&lt;/p&gt;
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can
+      <span class="removed"><del><strong>correlate ads</strong></del></span>
+    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If you want
+    GPS navigation, get a separate navigator which runs free software
+    and works</em></ins></span> with <span class="removed"><del><strong>Web 
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street 
Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
-    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information will be 
transmitted</strong></del></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span> 
the <span class="removed"><del><strong>user watches, and</strong></del></span> 
<span class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
-    the <span class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>user, access</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact that the
-      transmission reports a 404 error really means 
nothing;</strong></del></span> the <span class="removed"><del><strong>server
-      could save that</strong></del></span> data <span 
class="removed"><del><strong>anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>is nearly impossible, as</em></ins></span> it
-      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>involves
-    cracking</em></ins></span> the <span class="removed"><del><strong>user's 
local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do</strong></del></span> <span class="inserted"><ins><em>car's computer, which 
is always hidden and running with
-    proprietary software.&lt;/p&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden</em></ins></span> and
+      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>running with
+    proprietary software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect</em></ins></span> lots of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>personal data,</em></ins></span> and <span 
class="removed"><del><strong>even what</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when</em></ins></span> they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a junkyard the driver's personal data goes with
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span> <span 
class="inserted"><ins><em>junkyard</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes with
     them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtPlay --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford</em></ins></span> a 
<span class="removed"><del><strong>spyware app for its headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>lot of 
data,
+    near-complete access to</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network</em></ins></span> and 
<span class="removed"><del><strong>would then</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in 
breaking</em></ins></span> the <span class="removed"><del><strong>app would 
record</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by 
disconnecting</em></ins></span> the <span class="removed"><del><strong>names 
of</strong></del></span> <span class="inserted"><ins><em>cellular modem, or 
wrapping</em></ins></span> the <span class="removed"><del><strong>audio files
-users listen</strong></del></span>
-    <span class="inserted"><ins><em>antenna in aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>to
+      give it to</strong></del></span> <span class="inserted"><ins><em>you 
succeeded in breaking</em></ins></span> the <span 
class="removed"><del><strong>US</strong></del></span>
+    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem,</em></ins></span> or <span class="removed"><del><strong>some other 
government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it is mandatory for electric
-    cars</em></ins></span> to <span 
class="removed"><del><strong>along</strong></del></span> <span 
class="inserted"><ins><em>be equipped</em></ins></span> with <span 
class="removed"><del><strong>the headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>a terminal</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>was done without</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;
+    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
+    cars</em></ins></span> to be <span class="removed"><del><strong>trusted 
unless it is done
+    by free software in your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a 
terminal</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will be 
transmitted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,</em></ins></span>
+    to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>user watches, and</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810230"&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>fine 
print</strong></del></span> <span 
class="inserted"><ins><em>choices</em></ins></span> of <span 
class="inserted"><ins><em>radio programs&lt;/a&gt; in its
+    tracked</em></ins></span> the <span class="removed"><del><strong>switch to 
turn this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into</em></ins></span> the <span 
class="removed"><del><strong>app said</strong></del></span> <span 
class="inserted"><ins><em>contract</em></ins></span> that users <span 
class="removed"><del><strong>gave consent</strong></del></span> <span 
class="inserted"><ins><em>sign</em></ins></span> for <span 
class="removed"><del><strong>this,
-would</strong></del></span> <span class="inserted"><ins><em>some digital 
service
+    &lt;p&gt;GM did not get users' consent, but it could have 
got</em></ins></span> that <span class="inserted"><ins><em>easily by
+    sneaking it into</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
     &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of</em></ins></span> that <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+    &lt;p&gt;But if you really want to be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>server
+      could save</strong></del></span> <span class="inserted"><ins><em>car's
+    hardware cannot collect any of that data, or</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
+    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-  &lt;li id="M201711230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Users</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree 
software</em></ins></span> are <span class="removed"><del><strong>suing Bose 
for</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely and</em></ins></span> make <span 
class="inserted"><ins><em>changes in various
+    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if</em></ins></span> it 
<span class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without</strong></del></span> the 
<span class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>car 
remotely,</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>app said 
that users gave consent for this,
+would that make it acceptable? No way! It should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>phone company to 
track the car's movements all the time;
+    it is possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>extract
+    data remotely and determine the car's location</em></ins></span>
+    at <span class="removed"><del><strong>all&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>any time. (See Section 2, paragraphs 
b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
-  &lt;/li&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-  &lt;li id="M201303250"&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information</em></ins></span> about <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
+    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
+    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
       companies.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
-
-    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door</strong></del></span> <span class="inserted"><ins><em>matter of 
proprietary surveillance. These systems
-    are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but the invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
+      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3257,8 +3251,10 @@
   &lt;li id="M202008182"&gt;
     &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
@@ -3397,12 +3393,14 @@
     &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>rat their visitors</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
     to <span class="removed"><del><strong>advertising 
networks</strong></del></span> <span class="inserted"><ins><em>snoop on 
information</em></ins></span> that <span class="removed"><del><strong>track
-      users.  Of</strong></del></span> <span class="inserted"><ins><em>users 
have typed into a
-    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+      users.  Of the top 1000 web sites,</strong></del></span> <span 
class="inserted"><ins><em>users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some 
are</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span class="removed"><del><strong>top 
1000</strong></del></span> <span class="inserted"><ins><em>same sort of
+    &lt;p&gt;The chat facilities</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing</strong></del></span> <span class="inserted"><ins><em>some customer 
services use the same sort of
     malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
     read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
@@ -3411,21 +3409,20 @@
   &lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its</em></ins></span> web <span 
class="removed"><del><strong>sites,</strong></del></span> <span 
class="inserted"><ins><em>site to give other companies personal data on
+    JavaScript on its web site to give</em></ins></span> other
+      <span class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
-    &lt;p&gt;Some JavaScript malware</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711150"&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all the user's input, &lt;a
+    JavaScript code</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collect all the user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
@@ -3444,13 +3441,15 @@
   &lt;li id="M201310110"&gt;
     &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201003010"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
     &lt;p&gt;Flash Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps</em></ins></span> web sites <span 
class="inserted"><ins><em>track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3464,22 +3463,19 @@
   &lt;li id="M201906220"&gt;
     &lt;p&gt;Google Chrome is an &lt;a
     
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade
-    users' computers and report the</em></ins></span> sites <span 
class="inserted"><ins><em>they visit to advertising and
-    data companies, first of all to Google. Moreover, if users have a
-    Gmail account, Chrome automatically logs them in to the browser for
+    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
+    users' computers and</em></ins></span> report <span 
class="inserted"><ins><em>the sites they visit to advertising and
+    data companies, first of</em></ins></span> all <span 
class="removed"><del><strong>their visitors</strong></del></span> to <span 
class="removed"><del><strong>Google by using</strong></del></span> <span 
class="inserted"><ins><em>Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to</em></ins></span> the 
<span class="removed"><del><strong>Google Analytics service, 
which</strong></del></span> <span class="inserted"><ins><em>browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
     &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
-    with several changes</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
+    with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites report 
all their visitors to Google by using
-      the Google Analytics service, which</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+  &lt;li id="M201704131"&gt;
     &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
       tells Google</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
@@ -3560,22 +3556,23 @@
       &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
-    software.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M200809060"&gt;
-    &lt;p&gt;Google Chrome contains a key logger that &lt;a
-    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-    sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
+    software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
+&lt;p&gt;&lt;a href="/philosophy/javascript-trap.html"&gt;Javascript 
code&lt;/a&gt;
 is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
 
 
 &lt;!-- #SpywareEverywhere --&gt;</strong></del></span>
 
+  <span class="inserted"><ins><em>&lt;li id="M200809060"&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
+    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+    sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
 
 
 &lt;div class="big-section"&gt;
@@ -3586,20 +3583,26 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
-      &ldquo;their&rdquo; phones is</strong></del></span>
+      &ldquo;their&rdquo; phones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905281"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order</em></ins></span> to 
<span class="removed"><del><strong>make sure they can't &ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will</strong></del></span> be able to <span 
class="removed"><del><strong>listen for speech all</strong></del></span> <span 
class="inserted"><ins><em>create an account on</em></ins></span>
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world</em></ins></span> is <span 
class="inserted"><ins><em>still
+    struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing</em></ins></span> proprietary <span 
class="removed"><del><strong>software to make sure they can't 
&ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905281"&gt;
+    &lt;p&gt;Microsoft &lt;a
+    
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
+    people to give their phone number&lt;/a&gt; in order to</em></ins></span> 
be able to <span class="removed"><del><strong>listen for speech 
all</strong></del></span> <span class="inserted"><ins><em>create an account 
on</em></ins></span>
     the <span class="removed"><del><strong>time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3706,7 +3709,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 
2017</strong></del></span> <span 
class="inserted"><ins><em>2015-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 
2017</strong></del></span> <span 
class="inserted"><ins><em>2015-2021</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -3717,7 +3720,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/30 10:33:46 $
+$Date: 2021/01/04 10:03:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.376
retrieving revision 1.377
diff -u -b -r1.376 -r1.377
--- proprietary-surveillance.it.po      30 Dec 2020 10:33:46 -0000      1.376
+++ proprietary-surveillance.it.po      4 Jan 2021 10:03:02 -0000       1.377
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5337,6 +5337,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5454,10 +5462,10 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2015-] {+2015-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary-surveillance.ja-diff.html       30 Dec 2020 10:33:46 -0000      
1.235
+++ proprietary-surveillance.ja-diff.html       4 Jan 2021 10:03:02 -0000       
1.236
@@ -1665,50 +1665,56 @@
       social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="inserted"><ins><em>do so. A
-    free-software app that does more or less the same thing without
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>equal employment</em></ins></span>
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>freedom</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>make 
their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>do so. A
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>does more or less the same thing without
     spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a</em></ins></span> new <span class="removed"><del><strong>combined 
surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>one is being developed&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones</em></ins></span> 
and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>iPhones
-    running Google apps, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and
+      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps,</em></ins></span> and <span 
class="inserted"><ins><em>sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to be
-      <span class="removed"><del><strong>picked up by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>responsible for 
sending
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>huge number of &lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access to
-    the network but no direct access to the data. This 
results</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
+  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
-      Internet devices</strong></del></span> are <span 
class="removed"><del><strong>paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>difficult to understand. In any case,
+    lengthy terms of service that are difficult to understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3081,7 +3087,7 @@
 
     &lt;p&gt;You can bet Facebook will implement the maximum possible
     surveillance on Oculus Rift devices. The moral is, never trust a VR
-    system</em></ins></span> with <span class="inserted"><ins><em>nonfree 
software in it.&lt;/p&gt;
+    system with nonfree software in it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3093,7 +3099,7 @@
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy on their visitors.</em></ins></span>  
Web <span class="removed"><del><strong>activity,</strong></del></span> <span 
class="inserted"><ins><em>sites are not
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
    programs, so it
    &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
@@ -3107,7 +3113,7 @@
     unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
     
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    Opera, Microsoft Edge</em></ins></span> and <span 
class="removed"><del><strong>listening</strong></del></span> <span 
class="inserted"><ins><em>also in the upcoming Microsoft Edge that is
     going to be based on Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3156,32 +3162,27 @@
   &lt;/li&gt;
 
   &lt;li id="M201208210"&gt;
-    &lt;p&gt;Many web sites report all their visitors
+    &lt;p&gt;Many web sites report</em></ins></span> all <span 
class="inserted"><ins><em>their visitors
     to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and <span 
class="inserted"><ins><em>the page that was visited&lt;/a&gt;.&lt;/p&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
     &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
-    of other people's phone numbers or email addresses).  This violates
-    the privacy of those</em></ins></span> other <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+    of other people's phone numbers or email addresses).  This 
violates</em></ins></span>
+    the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>privacy of those other 
people.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
-    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
-    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and would 
then</strong></del></span> <span class="inserted"><ins><em>track visitors to 
those pages&lt;/a&gt;&mdash;even users
+    that don't</em></ins></span> have <span class="inserted"><ins><em>Facebook 
accounts.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3191,12 +3192,11 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
-    &lt;p&gt;Many web sites use JavaScript code</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would 
then</strong></del></span> <span class="inserted"><ins><em>snoop on information 
that users</em></ins></span> have <span class="inserted"><ins><em>typed into a
-    form but not sent&lt;/a&gt;, in order</em></ins></span> to
-      <span class="removed"><del><strong>give it to the US 
or</strong></del></span> <span class="inserted"><ins><em>learn their identity. 
Some are &lt;a
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
+    to
+      <span class="removed"><del><strong>give it</strong></del></span> <span 
class="inserted"><ins><em>snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order</em></ins></span> to <span 
class="removed"><del><strong>the US or</strong></del></span> <span 
class="inserted"><ins><em>learn their identity. Some are &lt;a
     
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
@@ -3322,26 +3322,27 @@
 &lt;!-- #SpywareOnTheWeb --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data</em></ins></span> on <span 
class="inserted"><ins><em>students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>Web&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy on their visitors.  Web 
sites</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools</em></ins></span> are <span 
class="removed"><del><strong>not
-   programs, so it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+&lt;p&gt;In addition, many web sites spy</strong></del></span> <span 
class="inserted"><ins><em>lack
+    of transparency</em></ins></span> on <span 
class="removed"><del><strong>their visitors.  Web sites are not
+   programs, so it
+   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
-    collecting far more data on students than</em></ins></span> is <span 
class="removed"><del><strong>an abuse all</strong></del></span> <span 
class="inserted"><ins><em>necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>same.&lt;/p&gt;
+   but</strong></del></span> the <span 
class="removed"><del><strong>surveillance is an abuse all</strong></del></span> 
<span class="inserted"><ins><em>part of both</em></ins></span> the <span 
class="removed"><del><strong>same.&lt;/p&gt;
 
 &lt;ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
-    of transparency on the part of both the educational 
services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>educational services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
     schools, the difficulty</em></ins></span> of <span 
class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
       businesses to show different people different prices&lt;/a&gt;. 
Most</strong></del></span> <span class="inserted"><ins><em>opting 
out</em></ins></span> of <span class="inserted"><ins><em>these services, 
and</em></ins></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
     of proper privacy policies, among other things.&lt;/p&gt;
@@ -3428,16 +3429,16 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash is also used 
for</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
-    &lt;p&gt;Google Chrome &lt;a
-    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    &lt;p&gt;Google Chrome</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
     software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200809060"&gt;
-    &lt;p&gt;Google Chrome contains a key logger that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
+    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3458,20 +3459,26 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
-      &ldquo;their&rdquo; phones is</strong></del></span>
+      &ldquo;their&rdquo; phones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201905281"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
-    people to give their phone number&lt;/a&gt; in order</em></ins></span> to 
<span class="removed"><del><strong>make sure they can't &ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will</strong></del></span> be able to <span 
class="removed"><del><strong>listen for speech all</strong></del></span> <span 
class="inserted"><ins><em>create an account on</em></ins></span>
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world</em></ins></span> is <span 
class="inserted"><ins><em>still
+    struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing</em></ins></span> proprietary <span 
class="removed"><del><strong>software to make sure they can't 
&ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905281"&gt;
+    &lt;p&gt;Microsoft &lt;a
+    
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
+    people to give their phone number&lt;/a&gt; in order to</em></ins></span> 
be able to <span class="removed"><del><strong>listen for speech 
all</strong></del></span> <span class="inserted"><ins><em>create an account 
on</em></ins></span>
     the <span class="removed"><del><strong>time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3578,7 +3585,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 
2017</strong></del></span> <span 
class="inserted"><ins><em>2015-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 
2017</strong></del></span> <span 
class="inserted"><ins><em>2015-2021</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -3589,7 +3596,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/30 10:33:46 $
+$Date: 2021/01/04 10:03:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.358
retrieving revision 1.359
diff -u -b -r1.358 -r1.359
--- proprietary-surveillance.ja.po      30 Dec 2020 10:33:47 -0000      1.358
+++ proprietary-surveillance.ja.po      4 Jan 2021 10:03:03 -0000       1.359
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4252,6 +4252,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -4361,7 +4369,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- proprietary-surveillance.pot        30 Dec 2020 10:33:47 -0000      1.297
+++ proprietary-surveillance.pot        4 Jan 2021 10:03:03 -0000       1.298
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3449,6 +3449,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a "
+"href=\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people
 "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a "
 
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\";>forces
 "
 "people to give their phone number</a> in order to be able to create an "
@@ -3531,7 +3539,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.663
retrieving revision 1.664
diff -u -b -r1.663 -r1.664
--- proprietary-surveillance.ru.po      30 Dec 2020 11:32:11 -0000      1.663
+++ proprietary-surveillance.ru.po      4 Jan 2021 10:03:03 -0000       1.664
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5096,6 +5097,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/";
 "all/why-does-my-new-e-mail-account-need-a-phone-"
 "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5210,7 +5219,10 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.de-diff.html    27 Dec 2020 14:30:56 -0000      1.207
+++ proprietary.de-diff.html    4 Jan 2021 10:03:03 -0000       1.208
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -125,18 +125,18 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -212,6 +212,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;p&gt;The personal finance management software "Quicken" &lt;a
+    
href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;has
+    a discontinuation policy aka planned obsolescence&lt;/a&gt; which is an
+    injustice to users. A free (as in freedom) program would let users'
+    to control the software but when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011050"&gt;
     &lt;p&gt;HP tricked users into installing
     a mischievous update in their printers that &lt;a
@@ -239,39 +256,6 @@
     get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
     and other things.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202012190"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
-    A Zoom executive carried out snooping and censorship for
-    China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
-    and soon corrected.&lt;/p&gt;
-
-    &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
-    href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -323,7 +307,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> 
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span> 
 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
@@ -335,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary.de.po   27 Dec 2020 14:30:56 -0000      1.245
+++ proprietary.de.po   4 Jan 2021 10:03:03 -0000       1.246
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -507,47 +524,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !
@@ -616,13 +592,13 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2018 Free Software Foundation, Inc."
 

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- proprietary.es.po   28 Dec 2020 09:41:25 -0000      1.370
+++ proprietary.es.po   4 Jan 2021 10:03:03 -0000       1.371
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -319,6 +320,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -370,70 +388,6 @@
 "researchers-say\">obtener las contraseñas de los iMonstruos</a>, utilizar el 
"
 "micrófono y la cámara, y más cosas."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\">Un ejecutivo de Zoom ha sido descubierto espiando y "
-"censurando para el gobierno chino</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Este abuso del poder de Zoom muestra lo peligroso que es ese poder. El "
-"problema de fondo no es la vigilancia y la censura, sino el poder del que "
-"dispone Zoom. Obtiene ese poder en parte gracias al uso de su servidor, pero "
-"en parte también gracias al programa cliente privativo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"Algunos enrutadores wifi Wavelink y JetStream contienen puertas traseras "
-"universales que permiten a usuarios no autentificados controlar no solo el "
-"enrutador, sino también cualquier dispositivo conectado a la red. Hay "
-"pruebas de que <a href=\"https://cybernews.com/security/walmart-exclusive-";
-"routers-others-made-in-china-contain-backdoors-to-control-devices/\">está "
-"vulnerabilidad está siendo aprovechada</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Si tiene intención de adquirir un enrutador, le exhortamos a que busque uno "
-"que <a href=\"https://ryf.fsf.org/categories/routers\";>funcione con software "
-"libre</a>. Cualquier intento de introducir en él funcionalidades maliciosas "
-"(por ejemplo, mediante una actualización del <cite>firmware</cite> será "
-"detectado por la comunidad y corregido enseguida."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Si por desgracia posee un enrutador que funciona con software que no es "
-"libre, no se alarme. Puede sustituir su <cite>firmware</cite> con un sistema "
-"operativo libre como <a href=\"https://librecmc.org\";>libreCMC</a>. Si no "
-"sabe cómo hacerlo, puede pedir ayuda a algún grupo de usuarios de GNU/Linux 
"
-"cercano."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -484,8 +438,14 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -513,3 +473,63 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\">Un ejecutivo de Zoom ha sido descubierto "
+#~ "espiando y censurando para el gobierno chino</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Este abuso del poder de Zoom muestra lo peligroso que es ese poder. El "
+#~ "problema de fondo no es la vigilancia y la censura, sino el poder del que "
+#~ "dispone Zoom. Obtiene ese poder en parte gracias al uso de su servidor, "
+#~ "pero en parte también gracias al programa cliente privativo."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "Algunos enrutadores wifi Wavelink y JetStream contienen puertas traseras "
+#~ "universales que permiten a usuarios no autentificados controlar no solo "
+#~ "el enrutador, sino también cualquier dispositivo conectado a la red. Hay "
+#~ "pruebas de que <a href=\"https://cybernews.com/security/walmart-exclusive-";
+#~ "routers-others-made-in-china-contain-backdoors-to-control-devices/\">está 
"
+#~ "vulnerabilidad está siendo aprovechada</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Si tiene intención de adquirir un enrutador, le exhortamos a que busque "
+#~ "uno que <a href=\"https://ryf.fsf.org/categories/routers\";>funcione con "
+#~ "software libre</a>. Cualquier intento de introducir en él funcionalidades 
"
+#~ "maliciosas (por ejemplo, mediante una actualización del <cite>firmware</"
+#~ "cite> será detectado por la comunidad y corregido enseguida."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\";>libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Si por desgracia posee un enrutador que funciona con software que no es "
+#~ "libre, no se alarme. Puede sustituir su <cite>firmware</cite> con un "
+#~ "sistema operativo libre como <a href=\"https://librecmc.org\";>libreCMC</"
+#~ "a>. Si no sabe cómo hacerlo, puede pedir ayuda a algún grupo de usuarios 
"
+#~ "de GNU/Linux cercano."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.415
retrieving revision 1.416
diff -u -b -r1.415 -r1.416
--- proprietary.fr.po   27 Dec 2020 19:16:01 -0000      1.415
+++ proprietary.fr.po   4 Jan 2021 10:03:03 -0000       1.416
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-12-27 20:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -315,6 +316,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -363,72 +381,6 @@
 "for-months-researchers-say\">extraire les mots de passe des iMonstres</a> et "
 "d'utiliser le micro et la caméra, entre autres choses."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\">Un dirigeant de Zoom a fait de la surveillance et de "
-"la censure pour le compte de la Chine</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Cet abus de pouvoir de la part de Zoom montre à quel point ce pouvoir est "
-"dangereux. Le fond du problème n'est pas la surveillance ou la censure, mais 
"
-"plutôt le pouvoir que possède Zoom. Cette société tire son pouvoir pour "
-"partie de l'utilisation de son serveur, mais aussi, pour une autre partie, "
-"de son programme client non libre."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"Les routeurs wifi Wavelink et JetStream ont des portes dérobées 
universelles "
-"qui permettent à des personnes non authentifiés, non seulement de les "
-"contrôler à distance, mais aussi de contrôler n'importe quel appareil "
-"connecté au réseau. Il est prouvé que <a href=\"https://cybernews.com/";
-"security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-"
-"control-devices/\">cette vulnérabilité est activement exploitée</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Si vous envisagez d'acheter un routeur, nous vous invitons à en choisir un "
-"qui <a href=\"https://ryf.fsf.org/categories/routers\";>fonctionne avec du "
-"logiciel libre</a>. Toute tentative d'y introduire une fonctionnalité "
-"malveillante (par exemple à l'occasion d'une mise à jour du micrologiciel) "
-"sera détectée par la communauté et vite corrigée."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Si malheureusement vous possédez un routeur qui fonctionne avec du logiciel "
-"privateur, pas de panique ! Il est peut-être possible de remplacer son "
-"micrologiciel avec un système d'exploitation libre comme <a href=\"https://";
-"librecmc.org\">libreCMC</a>. Si vous ne savez pas comment faire, vous pouvez "
-"trouver de l'aide auprès d'un groupe d'utilisateurs GNU/Linux de votre "
-"région."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -475,8 +427,14 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr "Copyright &copy; 2013-2020 Free Software Foundation, Inc."
 
@@ -503,6 +461,69 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\">Un dirigeant de Zoom a fait de la "
+#~ "surveillance et de la censure pour le compte de la Chine</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Cet abus de pouvoir de la part de Zoom montre à quel point ce pouvoir est 
"
+#~ "dangereux. Le fond du problème n'est pas la surveillance ou la censure, "
+#~ "mais plutôt le pouvoir que possède Zoom. Cette société tire son 
pouvoir "
+#~ "pour partie de l'utilisation de son serveur, mais aussi, pour une autre "
+#~ "partie, de son programme client non libre."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "Les routeurs wifi Wavelink et JetStream ont des portes dérobées "
+#~ "universelles qui permettent à des personnes non authentifiés, non "
+#~ "seulement de les contrôler à distance, mais aussi de contrôler 
n'importe "
+#~ "quel appareil connecté au réseau. Il est prouvé que <a href=\"https://";
+#~ "cybernews.com/security/walmart-exclusive-routers-others-made-in-china-"
+#~ "contain-backdoors-to-control-devices/\">cette vulnérabilité est "
+#~ "activement exploitée</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Si vous envisagez d'acheter un routeur, nous vous invitons à en choisir "
+#~ "un qui <a href=\"https://ryf.fsf.org/categories/routers\";>fonctionne avec "
+#~ "du logiciel libre</a>. Toute tentative d'y introduire une fonctionnalité "
+#~ "malveillante (par exemple à l'occasion d'une mise à jour du "
+#~ "micrologiciel) sera détectée par la communauté et vite corrigée."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\";>libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Si malheureusement vous possédez un routeur qui fonctionne avec du "
+#~ "logiciel privateur, pas de panique ! Il est peut-être possible de "
+#~ "remplacer son micrologiciel avec un système d'exploitation libre comme <a 
"
+#~ "href=\"https://librecmc.org\";>libreCMC</a>. Si vous ne savez pas comment "
+#~ "faire, vous pouvez trouver de l'aide auprès d'un groupe d'utilisateurs "
+#~ "GNU/Linux de votre région."
+
+#~ msgid ""
 #~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-";
 #~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
 #~ "sensitive personal data</a> that can be used for lifetime tracking of "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary.it-diff.html    27 Dec 2020 14:30:56 -0000      1.219
+++ proprietary.it-diff.html    4 Jan 2021 10:03:03 -0000       1.220
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -125,18 +125,18 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -211,6 +211,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;p&gt;The personal finance management software "Quicken" &lt;a
+    
href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;has
+    a discontinuation policy aka planned obsolescence&lt;/a&gt; which is an
+    injustice to users. A free (as in freedom) program would let users'
+    to control the software but when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011050"&gt;
     &lt;p&gt;HP tricked users into installing
     a mischievous update in their printers that &lt;a
@@ -238,39 +255,6 @@
     get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
     and other things.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202012190"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
-    A Zoom executive carried out snooping and censorship for
-    China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
-    and soon corrected.&lt;/p&gt;
-
-    &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
-    href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -322,7 +306,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> 
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span> 
 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
@@ -334,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.it.po   27 Dec 2020 14:30:56 -0000      1.254
+++ proprietary.it.po   4 Jan 2021 10:03:03 -0000       1.255
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -501,47 +518,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -590,13 +566,13 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- proprietary.ja-diff.html    27 Dec 2020 14:30:56 -0000      1.224
+++ proprietary.ja-diff.html    4 Jan 2021 10:03:03 -0000       1.225
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -210,6 +210,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;p&gt;The personal finance management software "Quicken" &lt;a
+    
href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;has
+    a discontinuation policy aka planned obsolescence&lt;/a&gt; which is an
+    injustice to users. A free (as in freedom) program would let users'
+    to control the software but when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011050"&gt;
     &lt;p&gt;HP tricked users into installing
     a mischievous update in their printers that &lt;a
@@ -237,39 +254,6 @@
     get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
     and other things.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202012190"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
-    A Zoom executive carried out snooping and censorship for
-    China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
-    and soon corrected.&lt;/p&gt;
-
-    &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
-    href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -321,7 +305,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> 
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020, 2021</em></ins></span> 
 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
@@ -333,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary.ja.po   27 Dec 2020 14:30:56 -0000      1.238
+++ proprietary.ja.po   4 Jan 2021 10:03:03 -0000       1.239
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -359,47 +376,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -447,7 +423,7 @@
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary.nl-diff.html    27 Dec 2020 14:30:56 -0000      1.220
+++ proprietary.nl-diff.html    4 Jan 2021 10:03:03 -0000       1.221
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -125,19 +125,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -211,6 +211,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;p&gt;The personal finance management software "Quicken" &lt;a
+    
href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;has
+    a discontinuation policy aka planned obsolescence&lt;/a&gt; which is an
+    injustice to users. A free (as in freedom) program would let users'
+    to control the software but when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011050"&gt;
     &lt;p&gt;HP tricked users into installing
     a mischievous update in their printers that &lt;a
@@ -238,39 +255,6 @@
     get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
     and other things.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202012190"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
-    A Zoom executive carried out snooping and censorship for
-    China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
-    and soon corrected.&lt;/p&gt;
-
-    &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
-    href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -322,7 +306,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> 
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020, 2021</em></ins></span> 
 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
@@ -334,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary.nl.po   27 Dec 2020 14:30:56 -0000      1.228
+++ proprietary.nl.po   4 Jan 2021 10:03:03 -0000       1.229
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -404,47 +421,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,13 +465,13 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
 #| "Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary.pl-diff.html    27 Dec 2020 14:30:56 -0000      1.237
+++ proprietary.pl-diff.html    4 Jan 2021 10:03:03 -0000       1.238
@@ -28,9 +28,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,10 +56,10 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited {
-   color: #004caa;
+ #skiplinks a, #skiplinks a:visited</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
+   <span class="inserted"><ins><em>color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
@@ -154,19 +154,19 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -210,6 +210,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;p&gt;The personal finance management software "Quicken" &lt;a
+    
href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;has
+    a discontinuation policy aka planned obsolescence&lt;/a&gt; which is an
+    injustice to users. A free (as in freedom) program would let users'
+    to control the software but when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011050"&gt;
     &lt;p&gt;HP tricked users into installing
     a mischievous update in their printers that &lt;a
@@ -237,39 +254,6 @@
     get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
     and other things.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202012190"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
-    A Zoom executive carried out snooping and censorship for
-    China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
-    and soon corrected.&lt;/p&gt;
-
-    &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
-    href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -321,7 +305,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span> 
+&lt;p&gt;Copyright &copy; 2013, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020, 
2021</em></ins></span> 
 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
@@ -333,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary.pl.po   27 Dec 2020 14:30:56 -0000      1.221
+++ proprietary.pl.po   4 Jan 2021 10:03:03 -0000       1.222
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -585,47 +602,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -674,11 +650,11 @@
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.pot     27 Dec 2020 14:30:56 -0000      1.218
+++ proprietary.pot     4 Jan 2021 10:03:03 -0000       1.219
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a "
+"href=\"https://www.quicken.com/support/quicken-discontinuation-policy\";>has "
+"a discontinuation policy aka planned obsolescence</a> which is an injustice "
+"to users. A free (as in freedom) program would let users' to control the "
+"software but when you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a "
+"href=\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people
 "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a "
 
"href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer\";>made
 "
@@ -294,47 +311,6 @@
 "other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/\";>
 "
-"A Zoom executive carried out snooping and censorship for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a "
-"href=\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/\";>
 "
-"this vulnerability is actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a "
-"href=\"https://ryf.fsf.org/categories/routers\";>runs on free "
-"software</a>. Any attempts at introducing malicious functionalities in it "
-"(e.g., through a firmware update) will be detected by the community, and "
-"soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -372,7 +348,7 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary.pt-br.po        29 Dec 2020 16:54:46 -0000      1.363
+++ proprietary.pt-br.po        4 Jan 2021 10:03:03 -0000       1.364
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-12-29 13:36-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 3.38.0\n"
 
@@ -313,6 +314,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -364,70 +382,6 @@
 "researchers-say\"> obter senhas de um iMonstros</a>, usar o microfone e a "
 "câmera, entre outras coisas."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> Um executivo da Zoom realizou espionagem e censura "
-"para a China</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Esse abuso do poder do Zoom mostra o quão perigoso é esse poder. A raiz do "
-"problema não é a vigilância e a censura, mas sim o poder que o Zoom tem. 
Ele "
-"obtém esse poder em parte do uso de seu servidor, mas também em parte do "
-"programa cliente não livre."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"Alguns roteadores wi-fi Wavelink e JetStream têm <i lang=\"en\">back doors</"
-"i> universais que permitem que usuários não autenticados controlem "
-"remotamente não apenas os roteadores, mas também quaisquer dispositivos "
-"conectados à rede. Há evidências de que <a href=\"https://cybernews.com/";
-"security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-"
-"control-devices/\"> esta vulnerabilidade é explorada ativamente</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Se você considerar a compra de um roteador, recomendamos que compre um que "
-"<a href=\"https://ryf.fsf.org/categories/routers\";>execute software livre </"
-"a>. Qualquer tentativa de introdução de funcionalidades maliciosas nele 
(por "
-"exemplo, por meio de uma atualização de firmware) será detectada pela "
-"comunidade e logo corrigida."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Se, infelizmente, você possui um roteador que executa software 
proprietário, "
-"não entre em pânico! Você pode substituir seu firmware por um sistema "
-"operacional livre, como o <a href=\"https://librecmc.org\";>libreCMC</a>. Se "
-"você não sabe como, pode obter ajuda de um grupo de usuários GNU/Linux "
-"próximo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,8 +427,12 @@
 "envio de traduções das páginas deste site."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -503,6 +461,66 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> Um executivo da Zoom realizou espionagem e "
+#~ "censura para a China</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Esse abuso do poder do Zoom mostra o quão perigoso é esse poder. A raiz "
+#~ "do problema não é a vigilância e a censura, mas sim o poder que o Zoom "
+#~ "tem. Ele obtém esse poder em parte do uso de seu servidor, mas também em 
"
+#~ "parte do programa cliente não livre."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "Alguns roteadores wi-fi Wavelink e JetStream têm <i lang=\"en\">back "
+#~ "doors</i> universais que permitem que usuários não autenticados 
controlem "
+#~ "remotamente não apenas os roteadores, mas também quaisquer dispositivos "
+#~ "conectados à rede. Há evidências de que <a 
href=\"https://cybernews.com/";
+#~ "security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-"
+#~ "to-control-devices/\"> esta vulnerabilidade é explorada ativamente</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Se você considerar a compra de um roteador, recomendamos que compre um "
+#~ "que <a href=\"https://ryf.fsf.org/categories/routers\";>execute software "
+#~ "livre </a>. Qualquer tentativa de introdução de funcionalidades "
+#~ "maliciosas nele (por exemplo, por meio de uma atualização de firmware) "
+#~ "será detectada pela comunidade e logo corrigida."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\";>libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Se, infelizmente, você possui um roteador que executa software "
+#~ "proprietário, não entre em pânico! Você pode substituir seu firmware 
por "
+#~ "um sistema operacional livre, como o <a href=\"https://librecmc.org";
+#~ "\">libreCMC</a>. Se você não sabe como, pode obter ajuda de um grupo de "
+#~ "usuários GNU/Linux próximo."
+
+#~ msgid ""
 #~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-";
 #~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
 #~ "sensitive personal data</a> that can be used for lifetime tracking of "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.441
retrieving revision 1.442
diff -u -b -r1.441 -r1.442
--- proprietary.ru.po   27 Dec 2020 14:30:56 -0000      1.441
+++ proprietary.ru.po   4 Jan 2021 10:03:03 -0000       1.442
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +319,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -367,71 +385,6 @@
 "researchers-say\"> извлекать пароли из ай-чудищ</a>, 
использовать микрофон и "
 "камеру и т.д."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> Руководитель Zoom проводил 
цензуру и слежку для "
-"Китая</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Это злоупотребление властью Zoom 
показывает, как опасна эта власть. Проблема 
"
-"коренится не в слежке и цензуре, а во 
власти, которой обладает Zoom. Он "
-"получает эту власть частично из-за 
пользования его сервером, но частично "
-"также из-за несвободной 
программы-клиента."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"В некоторых беспроводных маршрутизаторах 
Wavelink и JetStream есть "
-"универсальный черный ход, который 
позволяет неидентифицированным "
-"пользователям удаленно контролировать не 
только эти маршрутизаторы, но также "
-"любые устройства, подключенные к сети. 
Есть свидетельство, что <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> эта уязвимость 
активно "
-"эксплуатируется</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Если вы подумываете о покупке 
маршрутизатора, мы советуем вам 
остановиться "
-"на одном из <a 
href=\"https://ryf.fsf.org/categories/routers\";>работающих "
-"под управлением свободных программ</a>. 
Любые попытки ввода в него "
-"вредоносных функций (напр., через 
обновление программ в них) будет "
-"обнаружено сообществом и вскоре 
исправлено."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Если вам не посчастливилось иметь 
маршрутизатор, работающий на несвободных "
-"программах, не отчаивайтесь! Возможно, вам 
удастся заменить его программы на "
-"свободную операционную систему, такую как 
<a href=\"https://librecmc.org";
-"\">libreCMC</a>. Если вы не знаете, как это 
делается, обратитесь в ближайшую "
-"группу пользователей GNU/Linux."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -476,8 +429,14 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -508,6 +467,67 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> Руководитель Zoom 
проводил цензуру и слежку "
+#~ "для Китая</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Это злоупотребление властью Zoom 
показывает, как опасна эта власть. "
+#~ "Проблема коренится не в слежке и 
цензуре, а во власти, которой обладает "
+#~ "Zoom. Он получает эту власть частично из-за 
пользования его сервером, но "
+#~ "частично также из-за несвободной 
программы-клиента."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "В некоторых беспроводных 
маршрутизаторах Wavelink и JetStream есть "
+#~ "универсальный черный ход, который 
позволяет неидентифицированным "
+#~ "пользователям удаленно контролировать 
не только эти маршрутизаторы, но "
+#~ "также любые устройства, подключенные к 
сети. Есть свидетельство, что <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> эта 
уязвимость "
+#~ "активно эксплуатируется</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Если вы подумываете о покупке 
маршрутизатора, мы советуем вам "
+#~ "остановиться на одном из <a 
href=\"https://ryf.fsf.org/categories/routers";
+#~ "\">работающих под управлением свободных 
программ</a>. Любые попытки ввода "
+#~ "в него вредоносных функций (напр., через 
обновление программ в них) будет "
+#~ "обнаружено сообществом и вскоре 
исправлено."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\";>libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Если вам не посчастливилось иметь 
маршрутизатор, работающий на "
+#~ "несвободных программах, не 
отчаивайтесь! Возможно, вам удастся 
заменить "
+#~ "его программы на свободную операционную 
систему, такую как <a href="
+#~ "\"https://librecmc.org\";>libreCMC</a>. Если вы не знаете, 
как это "
+#~ "делается, обратитесь в ближайшую группу 
пользователей GNU/Linux."
+
+#~ msgid ""
 #~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-";
 #~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
 #~ "sensitive personal data</a> that can be used for lifetime tracking of "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.tr.po   27 Dec 2020 14:30:56 -0000      1.96
+++ proprietary.tr.po   4 Jan 2021 10:03:03 -0000       1.97
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-12-17 18:19+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -319,6 +319,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -358,47 +375,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -446,8 +422,12 @@
 "\">çalışma&nbsp;sayfamızı</a> ziyaret edebilirsiniz."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.zh-cn.po        28 Dec 2020 10:01:20 -0000      1.121
+++ proprietary.zh-cn.po        4 Jan 2021 10:03:03 -0000       1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-12-28 17:42+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -294,6 +295,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -338,62 +356,6 @@
 "theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-"
 "for-months-researchers-say\">从 iMonster 获取密码</a>。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\">某 Zoom 高管为中国执行嗅探和审查。</a>。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"滥用 Zoom 的权力展示了这种权力会有多么危险。问题的æ 
¹æºä¸æ—¶ç›‘控和审查,而在于 "
-"Zoom 有这样的权力。这种权力一部分来自于å…
¶æœåŠ¡å™¨ï¼Œä¹Ÿæœ‰ä¸€éƒ¨åˆ†æ¥è‡ªäºŽå…¶éžè‡ªç”±å®¢æˆ·"
-"端。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"有些 Wavelink 和 JetStream wifi 路由器带有全局后门,它们不仅
让未经授权的用户"
-"可以远程控制路由器,而且还可以控制接å…
¥ç½‘络的任何设备。有证据表明 <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\">该漏洞已经被利用</a>。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"如果你正打算买路由器,那么我们建议你买 <a 
href=\"https://ryf.fsf.org/";
-"categories/routers\">运行自由软件</a> 
的路由器。如果它有恶意功能(比如通过固"
-"件),社区都会发现并迅速修复。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"如果你不幸已经有了运行专有软件的路由器,也不必紧张
!你也许可以用自由软件 <a "
-"href=\"https://librecmc.org\";>libreCMC</a> 替代å…
¶ä¸­çš„软有软件。如果你不知道怎"
-"么做,请联系当地的 GNU/Linux 用户组寻求帮助。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -446,8 +408,12 @@
 "a>。"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -478,6 +444,59 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-";
+#~ "helped-china-surveillance/\">某 Zoom 高管为中国执行嗅
探和审查。</a>。"
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "滥用 Zoom 的权力展示了这种权力会有多么危险。问题的æ 
¹æºä¸æ—¶ç›‘控和审查,而在"
+#~ "于 Zoom 有这样的权力。这种权力一部分来自于å…
¶æœåŠ¡å™¨ï¼Œä¹Ÿæœ‰ä¸€éƒ¨åˆ†æ¥è‡ªäºŽå…¶éžè‡ª"
+#~ "由客户端。"
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "有些 Wavelink 和 JetStream wifi 路由器带有å…
¨å±€åŽé—¨ï¼Œå®ƒä»¬ä¸ä»…让未经授权的用"
+#~ "户可以远程控制路由器,而且还可以控制接å…
¥ç½‘络的任何设备。有证据表明 <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-";
+#~ 
"made-in-china-contain-backdoors-to-control-devices/\">该漏洞已经被利用</"
+#~ "a>。"
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "如果你正打算买路由器,那么我们建议你买 <a 
href=\"https://ryf.fsf.org/";
+#~ "categories/routers\">运行自由软件</a> 
的路由器。如果它有恶意功能(比如通过"
+#~ "固件),社区都会发现并迅速修复。"
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\";>libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "如果你不幸已经有了运行专有软件的路由器,也不必紧张
!你也许可以用自由软件 "
+#~ "<a href=\"https://librecmc.org\";>libreCMC</a> 替代å…
¶ä¸­çš„软有软件。如果你不"
+#~ "知道怎么做,请联系当地的 GNU/Linux 用户组寻求帮助。"
+
+#~ msgid ""
 #~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-";
 #~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
 #~ "sensitive personal data</a> that can be used for lifetime tracking of "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary.zh-tw-diff.html 27 Dec 2020 14:30:57 -0000      1.200
+++ proprietary.zh-tw-diff.html 4 Jan 2021 10:03:03 -0000       1.201
@@ -27,10 +27,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -125,18 +125,18 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -212,6 +212,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;p&gt;The personal finance management software "Quicken" &lt;a
+    
href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;has
+    a discontinuation policy aka planned obsolescence&lt;/a&gt; which is an
+    injustice to users. A free (as in freedom) program would let users'
+    to control the software but when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011050"&gt;
     &lt;p&gt;HP tricked users into installing
     a mischievous update in their printers that &lt;a
@@ -239,39 +256,6 @@
     get passwords out of an iMonster&lt;/a&gt;, use the microphone and camera,
     and other things.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202012190"&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
-    A Zoom executive carried out snooping and censorship for
-    China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
-    and soon corrected.&lt;/p&gt;
-
-    &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
-    href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -323,7 +307,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> 
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span> 
 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
@@ -335,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/27 14:30:57 $
+$Date: 2021/01/04 10:03:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.zh-tw.po        27 Dec 2020 14:30:57 -0000      1.208
+++ proprietary.zh-tw.po        4 Jan 2021 10:03:04 -0000       1.209
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "HP tricked users into installing a mischievous update in their printers that "
 "<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-";
 "soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -474,47 +491,6 @@
 "and camera, and other things."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-";
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\";>runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\";>libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -557,8 +533,14 @@
 "宜。"
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- pt-br.po    30 Dec 2020 10:33:47 -0000      1.322
+++ pt-br.po    4 Jan 2021 10:03:04 -0000       1.323
@@ -8832,6 +8832,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -8844,6 +8853,16 @@
 "kill-fix\"> desligou o servidor para modelos antigos</a>, então, agora, se "
 "você tentar reinstalar as configurações padrão, eles serão inutilizados."
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Software proprietário - Projeto GNU - Free Software Foundation"
@@ -9152,6 +9171,14 @@
 msgid "Latest additions"
 msgstr "Últimas adições"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -9181,14 +9208,14 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 
 #. type: Content of: <title>
 #, fuzzy
@@ -10178,6 +10205,16 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -10439,6 +10476,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "<small>Note: this article uses the word &ldquo;free&rdquo; in the sense "
 #~| "of &ldquo;gratis.&rdquo;</small>"
 #~ msgid ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.544
retrieving revision 1.545
diff -u -b -r1.544 -r1.545
--- ru.po       30 Dec 2020 11:59:51 -0000      1.544
+++ ru.po       4 Jan 2021 10:03:04 -0000       1.545
@@ -10698,6 +10698,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -10711,6 +10720,14 @@
 "пытаешься переустановить исходные 
настройки, то вместо этого планшет выходит "
 "из строя."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11010,6 +11027,14 @@
 msgid "Latest additions"
 msgstr "Последние добавления"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -11035,8 +11060,14 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -12211,6 +12242,13 @@
 "Конкретно, спецслужба может таким образом 
собирать электронную почту членов "
 "парламента, потому что она проходит через 
Microsoft."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
 msgstr ""
@@ -12460,6 +12498,13 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+
+#~ msgid ""
 #~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
 #~ "the easiest way to make sure it isn't spying on you is to disconnect it "
 #~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- tr.po       30 Dec 2020 10:33:47 -0000      1.106
+++ tr.po       4 Jan 2021 10:03:04 -0000       1.107
@@ -7815,6 +7815,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7822,6 +7831,12 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "Özel Mülk Yazılım - GNU Projesi - Özgür Yazılım Vakfı"
@@ -8120,6 +8135,14 @@
 msgid "Latest additions"
 msgstr "Son eklenenler"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -8148,8 +8171,12 @@
 "\">çalışma&nbsp;sayfamızı</a> ziyaret edebilirsiniz."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -9113,6 +9140,12 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9350,6 +9383,13 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+
 #, fuzzy
 #~| msgid ""
 #~| "<small>(Note that this article misuses the word &ldquo;<a href=\"/"

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- zh-cn.po    30 Dec 2020 10:33:47 -0000      1.106
+++ zh-cn.po    4 Jan 2021 10:03:04 -0000       1.107
@@ -7613,6 +7613,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7620,6 +7629,16 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "专有软件 - GNU 工程 - 自由软件基金会"
@@ -7901,6 +7920,14 @@
 msgid "Latest additions"
 msgstr "最新添加"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #
 #
 #
@@ -7928,8 +7955,12 @@
 "a>。"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -8876,6 +8907,16 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9162,6 +9203,13 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
 
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+
 #, fuzzy
 #~| msgid ""
 #~| "<small>(Note that this article misuses the word &ldquo;<a href=\"/"

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- zh-tw.po    30 Dec 2020 10:33:47 -0000      1.253
+++ zh-tw.po    4 Jan 2021 10:03:04 -0000       1.254
@@ -7519,6 +7519,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www.";
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The British supermarket Tesco sold tablets which were tethered to Tesco's "
 "server for reinstalling default settings.  Tesco <a href=\"https://www.";
 "theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7526,6 +7535,18 @@
 "default settings, it bricks them instead."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2019, 2020,
+# | 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
 msgstr "專有軟體 - GNU 專案 - 自由軟體基金會"
@@ -7949,6 +7970,14 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
 #
 #
 #
@@ -7976,18 +8005,18 @@
 "README</a> 來瞭解協調和提交我們的網頁翻譯相關事宜。"
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
 msgid ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
 "Software Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
 
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Sabotage+} - GNU Project - Free Software
@@ -8935,6 +8964,18 @@
 "because they pass it through Microsoft."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2015-2021+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
 # | Foundation
@@ -9302,6 +9343,17 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]