www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-games.es.html malware-m...


From: GNUN
Subject: www/proprietary malware-games.es.html malware-m...
Date: Wed, 6 Jan 2021 05:32:30 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/01/06 05:32:29

Modified files:
        proprietary    : malware-games.es.html malware-microsoft.es.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.es.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po 
                         malware-games.es-en.html malware-games.es.po 
                         malware-microsoft.es-en.html 
                         malware-microsoft.es.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.458&r2=1.459
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.366&r2=1.367
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.583&r2=1.584
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.360&r2=1.361
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.667&r2=1.668
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.423&r2=1.424
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.374&r2=1.375
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.449&r2=1.450
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.552&r2=1.553
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.259&r2=1.260

Patches:
Index: malware-games.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.es.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-games.es.html       5 Jan 2021 11:02:23 -0000       1.15
+++ malware-games.es.html       6 Jan 2021 10:32:22 -0000       1.16
@@ -98,7 +98,7 @@
   </li>
 
   <li id="M202010210">
-    <p>Loas jugadores de Minecraft <a
+    <p>Desde 2019-2020, los jugadores de Minecraft <a
 href="https://www.minecraft.net/en-us/article/java-edition-moving-house";>se
 ven obligados a migrar a los servidores de Microsoft</a>, con la consecuente
 violación de su privacidad. Microsoft publica un programa que permite a los
@@ -446,7 +446,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/01/05 11:02:23 $
+$Date: 2021/01/06 10:32:22 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-microsoft.es.html   5 Jan 2021 11:02:23 -0000       1.87
+++ malware-microsoft.es.html   6 Jan 2021 10:32:22 -0000       1.88
@@ -460,7 +460,7 @@
   </li>
 
   <li id="M202010210">
-    <p>Loas jugadores de Minecraft <a
+    <p>Desde 2019-2020, los jugadores de Minecraft <a
 href="https://www.minecraft.net/en-us/article/java-edition-moving-house";>se
 ven obligados a migrar a los servidores de Microsoft</a>, con la consecuente
 violación de su privacidad. Microsoft publica un programa que permite a los
@@ -807,7 +807,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/01/05 11:02:23 $
+$Date: 2021/01/06 10:32:22 $
 
 <!-- timestamp end -->
 </p>

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/de.po    6 Jan 2021 03:01:37 -0000       1.259
+++ po/de.po    6 Jan 2021 10:32:22 -0000       1.260
@@ -2719,6 +2719,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -4756,10 +4768,10 @@
 "sind Tyrannen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2016-] {+2016-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2016-] {+2016-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5857,13 +5869,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2016-] {+2016-2021+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -12699,18 +12704,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -12985,6 +12978,13 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2016-] {+2016-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr "Proprietäre Überwachung - GNU-Projekt - Free Software Foundation"

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- po/es.po    6 Jan 2021 03:01:39 -0000       1.370
+++ po/es.po    6 Jan 2021 10:32:22 -0000       1.371
@@ -2616,6 +2616,49 @@
 msgstr "<cite>Malware</cite> en los dispositivos móviles"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# | 
href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy
+# | Not Included&rdquo;</a> list <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\";>are-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+&ldquo;Minimum+} Security [-Standards\".-] {+Standards.&rdquo;+}
+# | Insecure design of the program running on some of these devices <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\";>makes-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/";
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
+msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+"La mayoría de los aparatos conectados a Internet que se encuentran en la "
+"lista de Mozilla <a href=\"https://foundation.mozilla.org/es/";
+"privacynotincluded\">«Privacidad no incluida»</a><a href=\"https://";
+"foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">están "
+"diseñados para espiar a los usuarios</a>, incluso cuando cumplen los "
+"«Estándares mínimos de seguridad» de Mozilla. El diseño inseguro del "
+"programa que se ejecuta en algunos de estos aparatos <a href=\"https://";
+"foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"
+"\">hace al usuario susceptible de ser espiado y también de ser presa de "
+"delincuentes informáticos</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
@@ -4433,7 +4476,10 @@
 "Achievements\">son tiranos</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2016-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5651,13 +5697,6 @@
 "buena parte de los datos personales</a>, incluso muchas actividades que no "
 "tienen nada que ver con las trampas."
 
-#. type: Content of: <div><p>
-# | Copyright &copy; 2016-202[-0-]{+1+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
 # | Foundation
@@ -12945,18 +12984,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -13241,6 +13268,10 @@
 "Aquí se presentan ejemplos de suscripciones de software que causan un daño "
 "directo a los usuarios."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Tyrants-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.458
retrieving revision 1.459
diff -u -b -r1.458 -r1.459
--- po/fr.po    6 Jan 2021 03:01:39 -0000       1.458
+++ po/fr.po    6 Jan 2021 10:32:22 -0000       1.459
@@ -2244,6 +2244,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -3905,8 +3917,8 @@
 "des tyrans</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4968,10 +4980,6 @@
 "grand nombre correspondent à des activités n'ayant rien à voir avec la "
 "triche."
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11157,18 +11165,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -11409,6 +11405,10 @@
 "Vous trouverez ci-dessous des exemples d'abonnements à des logiciels qui ont 
"
 "fait du tort directement aux utilisateurs."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr "Surveillants privateurs - GNU Project - Free Software Foundation"

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/it.po    6 Jan 2021 03:01:40 -0000       1.259
+++ po/it.po    6 Jan 2021 10:32:22 -0000       1.260
@@ -2616,6 +2616,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -4434,10 +4446,10 @@
 "\">sono tiranni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014-2017-] {+2016-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2017-] {+2016-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5450,13 +5462,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2014-2017-] {+2016-2021+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
 # | Foundation
@@ -11824,18 +11829,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -12075,6 +12068,13 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014-2017-] {+2016-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr "Sorveglianza proprietaria - Progetto GNU - Free Software Foundation"

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- po/ja.po    6 Jan 2021 03:01:41 -0000       1.267
+++ po/ja.po    6 Jan 2021 10:32:24 -0000       1.268
@@ -2029,6 +2029,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -3396,7 +3408,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -4245,12 +4257,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -9285,18 +9291,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -9510,6 +9504,12 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr ""

Index: po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/malware-appliances.de-diff.html  30 Dec 2020 10:33:45 -0000      1.64
+++ po/malware-appliances.de-diff.html  6 Jan 2021 10:32:24 -0000       1.65
@@ -93,45 +93,58 @@
       send</strong></del></span> <span class="inserted"><ins><em>this page but 
isn't
 here, please write
 to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-      lot</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL</em></ins></span> of <span 
class="removed"><del><strong>data about</strong></del></span> <span 
class="inserted"><ins><em>a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+      lot of data about</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or 
two</em></ins></span>
+to <span class="removed"><del><strong>make</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202011230"&gt;
-    &lt;p&gt;Some Wavelink and JetStream wifi routers have
-    universal back doors that enable unauthenticated
-    users to remotely control not only</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M202101050"&gt;
+    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    Not Included&rdquo;&lt;/a&gt; list &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
+    designed to snoop on users&lt;/a&gt; even if they meet
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
+    design</em></ins></span> of the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>routers, but
-    also any devices connected</em></ins></span> to <span 
class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of</strong></del></span> the <span 
class="removed"><del><strong>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
+      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>program running on some of these 
devices</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    the user susceptible to be snooped and exploited</em></ins></span> by 
<span class="inserted"><ins><em>crackers as
+    well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span> <span 
class="inserted"><ins><em>network. There</em></ins></span> is <span 
class="removed"><del><strong>a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>evidence that</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability</em></ins></span> is <span 
class="removed"><del><strong>an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</strong></del></span> <span class="inserted"><ins><em>actively 
exploited&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M202011230"&gt;
+    &lt;p&gt;Some Wavelink and JetStream wifi routers have
+    universal back doors that enable unauthenticated
+    users to remotely control not only</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>routers, but
+    also any devices connected to</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>network. There is evidence</em></ins></span> that 
<span class="removed"><del><strong>the device</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
+    this vulnerability</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>actively exploited&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
-    that &lt;a 
href="https://ryf.fsf.org/categories/routers"&gt;runs</em></ins></span> on 
<span class="inserted"><ins><em>free
+    &lt;p&gt;If you consider buying a router, we encourage 
you</em></ins></span> to <span class="inserted"><ins><em>get one
+    that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
     software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by</em></ins></span> 
the <span class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>community,
+    it (e.g., through</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> <span class="inserted"><ins><em>firmware update) 
will be detected by the community,
     and soon corrected.&lt;/p&gt;
 
-    &lt;p&gt;If unfortunately you own a router</em></ins></span> that <span 
class="removed"><del><strong>the device is tethered</strong></del></span> <span 
class="inserted"><ins><em>runs on
-    proprietary software, don't panic! You may be able</em></ins></span> to
-    <span class="inserted"><ins><em>replace its firmware 
with</em></ins></span> a <span class="removed"><del><strong>server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>free operating system such as &lt;a
+    &lt;p&gt;If unfortunately you own a router that runs on</em></ins></span>
+    proprietary <span 
class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span 
class="inserted"><ins><em>software, don't panic! You may be able to
+    replace its firmware with a free operating system such as &lt;a
     href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
     you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
   &lt;/li&gt;
@@ -139,14 +152,14 @@
   &lt;li id="M202007280"&gt;
     &lt;p&gt;The Focals eyeglass display, with snooping
     microphone, has been eliminated.  Google eliminated
-    it by buying</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and shutting it down.  It also &lt;a
+    it by buying the manufacturer and shutting</em></ins></span> it <span 
class="inserted"><ins><em>down.  It</em></ins></span> also <span 
class="removed"><del><strong>demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.ctvnews.ca/sci-tech/canadian-smart-glasses-going-offline-weeks-after-company-bought-by-google-1.5042010"&gt;shut
-    down</em></ins></span> the <span class="removed"><del><strong>company
+    down</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>server these 
devices depend on&lt;/a&gt;, which caused</em></ins></span> the <span 
class="removed"><del><strong>company
       surveillance capability.&lt;/p&gt;
 &lt;/li&gt;
   
 &lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump 
designed</strong></del></span> <span class="inserted"><ins><em>server these 
devices depend on&lt;/a&gt;, which caused the ones
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump 
designed</strong></del></span> <span class="inserted"><ins><em>ones
     already sold to cease to function.&lt;/p&gt;
 
     &lt;p&gt;It may be a good thing to wipe out this product&mdash;for
@@ -252,71 +265,74 @@
 
 &lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>service to control them through&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;While it is laudable</em></ins></span> that <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>Best Buy recognized it</em></ins></span> was <span 
class="removed"><del><strong>done without</strong></del></span> <span 
class="inserted"><ins><em>mistreating</em></ins></span>
-    the <span class="removed"><del><strong>users' consent.
-If the fine print of</strong></del></span> <span 
class="inserted"><ins><em>customers by doing so, this doesn't 
alter</em></ins></span> the <span class="removed"><del><strong>app 
said</strong></del></span> <span 
class="inserted"><ins><em>facts</em></ins></span> that <span 
class="removed"><del><strong>users gave consent for this,
-would</strong></del></span>
-    <span class="inserted"><ins><em>tethering the device to a particular 
server is a path to screwing the
-    users, and</em></ins></span> that <span 
class="removed"><del><strong>make</strong></del></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
+    &lt;p&gt;While it is laudable</em></ins></span> that <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>Best Buy recognized it</em></ins></span> was <span 
class="removed"><del><strong>done without the users' consent.
+If</strong></del></span> <span 
class="inserted"><ins><em>mistreating</em></ins></span>
+    the <span class="removed"><del><strong>fine print of</strong></del></span> 
<span class="inserted"><ins><em>customers by doing so, this doesn't 
alter</em></ins></span> the <span class="removed"><del><strong>app 
said</strong></del></span> <span 
class="inserted"><ins><em>facts</em></ins></span> that <span 
class="removed"><del><strong>users gave consent for this,
+would that make it acceptable? No way! It should be flat out
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal to design</strong></del></span> <span class="inserted"><ins><em>is a 
consequence of having nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>device.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+illegal to design</strong></del></span>
+    <span class="inserted"><ins><em>tethering</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade 
that</strong></del></span> <span class="inserted"><ins><em>id="M201904260"&gt;
-    &lt;p&gt;The Jibo robot toys were</em></ins></span> tethered <span 
class="inserted"><ins><em>to the manufacturer's server,
-    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
-    the company made</em></ins></span> them <span 
class="inserted"><ins><em>all cease to work&lt;/a&gt; by shutting down that
+&lt;li id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade that
+  tethered them</strong></del></span> <span 
class="inserted"><ins><em>device</em></ins></span> to a <span 
class="removed"><del><strong>remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant 
dishwasher</strong></del></span> <span class="inserted"><ins><em>particular 
server</em></ins></span> is
+<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>a path</em></ins></span> to <span 
class="inserted"><ins><em>screwing</em></ins></span> the <span 
class="removed"><del><strong>Internet,
+its security</strong></del></span>
+    <span class="inserted"><ins><em>users, and that it</em></ins></span> is 
<span class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example,</strong></del></span> a <span 
class="removed"><del><strong>cracker can gain access</strong></del></span> 
<span class="inserted"><ins><em>consequence of having nonfree software in the
+    device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered</em></ins></span> to the <span 
class="removed"><del><strong>dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,</em></ins></span>
+    and <span class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>dishwasher</strong></del></span> 
<span class="inserted"><ins><em>company made them all cease</em></ins></span> 
to <span class="removed"><del><strong>launch attacks</strong></del></span> 
<span class="inserted"><ins><em>work&lt;/a&gt; by shutting down that
     server.&lt;/p&gt;
 
     &lt;p&gt;The shutdown might ironically be good for their users, since the
-    product was designed</em></ins></span> to <span 
class="inserted"><ins><em>manipulate people by presenting</em></ins></span> a 
<span class="removed"><del><strong>remote server.</strong></del></span> <span 
class="inserted"><ins><em>phony
-    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying</em></ins></span> on
+ <span class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
     two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+    defibrillators&lt;/a&gt; and the</em></ins></span> devices <span 
class="inserted"><ins><em>they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in</em></ins></span> an <span 
class="removed"><del><strong>account</strong></del></span> <span 
class="inserted"><ins><em>earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely</em></ins></span> on <span 
class="removed"><del><strong>Anova's servers,</strong></del></span> <span 
class="inserted"><ins><em>proprietary software
-    developers to fix bugs in</em></ins></span> their
-  <span class="removed"><del><strong>cookers won't 
function.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>products.&lt;/p&gt;</em></ins></span>
+    vulnerabilities were discovered</em></ins></span> in <span 
class="inserted"><ins><em>an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
<span class="removed"><del><strong>network. Since these dishwashers are 
used</strong></del></span> <span class="inserted"><ins><em>company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs</em></ins></span> in <span 
class="removed"><del><strong>hospitals,
+ such attacks could potentially put hundreds of lives at 
risk.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
products.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant 
dishwasher</strong></del></span>
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera</em></ins></span> is
-<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>designed so 
that</em></ins></span> the <span class="removed"><del><strong>Internet,
-its security is crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now 
Amazon)</em></ins></span> can <span class="removed"><del><strong>gain access 
to</strong></del></span> <span class="inserted"><ins><em>watch 
all</em></ins></span> the <span class="removed"><del><strong>dishwasher's 
filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>time. 
Now</em></ins></span> it <span class="removed"><del><strong>with 
malware,</strong></del></span> <span class="inserted"><ins><em>turns out
-    that &lt;a
-    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch,</em></ins></span> and <span 
class="removed"><del><strong>force the dishwasher</strong></del></span> <span 
class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else</em></ins></span> can <span class="removed"><del><strong>still 
remotely control it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
- other devices in</strong></del></span> <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
- such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
-
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>design 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners can still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
@@ -327,68 +343,68 @@
     &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
       report everything</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
-      and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable</strong></del></span> <span class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it</strong></del></span> 
<span class="inserted"><ins><em>subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>not hidden 
as</strong></del></span>
-    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt; to make sure the 
user</em></ins></span> is <span class="removed"><del><strong>viewed on 
them,</strong></del></span> <span class="inserted"><ins><em>still
+    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
-    restrictions</em></ins></span> in
-    <span class="removed"><del><strong>these TVs, does not 
legitimize</strong></del></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;</em></ins></span>
+    specific cases, it spies on users,</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>involves totally unacceptable
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by,</em></ins></span> the user's <span 
class="removed"><del><strong>own
+    computer,</strong></del></span> <span class="inserted"><ins><em>front 
door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at</em></ins></span> the <span class="removed"><del><strong>TV reports 
what it is. The existence of a way</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has 
tried</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
+&lt;p&gt;More or less all &ldquo;smart&rdquo;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio</em></ins></span> TVs &lt;a
 <span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;The report was as of 2014, but we don't expect this has got
+&lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>2014, but we 
don't expect</strong></del></span> <span class="inserted"><ins><em>the company's
+    CTO, and</em></ins></span> this <span class="removed"><del><strong>has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases, the video</em></ins></span> shows <span 
class="inserted"><ins><em>everyone</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+&lt;p&gt;This shows that laws requiring products</strong></del></span> <span 
class="inserted"><ins><em>data is sold</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
 consent before collecting personal data are totally inadequate.  And
-what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span class="removed"><del><strong>TV 
will say,
-&ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
-    at</em></ins></span> the <span class="removed"><del><strong>TV will not
+what happens if a user declines consent?  Probably the TV will say,
+&ldquo;Without your consent to tracking, the TV will not
 work.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Proper laws would say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>videos freely.  It appears Amazon has 
tried</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span class="inserted"><ins><em>prevent that
-    secondary abuse, but</em></ins></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Some LG</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio</em></ins></span> TVs &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+&lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+user watches &mdash; no exceptions!&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;Some LG
+TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
 tyrants&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;a
 
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>base
-for a tyrant system&lt;/a&gt; so as</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>impose DRM.
-What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+Samsung &ldquo;Smart&rdquo; TVs have turned Linux into the 
base</strong></del></span> <span class="inserted"><ins><em>third parties. This 
is in return</em></ins></span> for <span class="removed"><del><strong>a tyrant 
system&lt;/a&gt; so as to impose DRM.
+What enables Samsung</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
     &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>do</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="inserted"><ins><em>spying acceptable, according to him,</em></ins></span>
@@ -415,7 +431,7 @@
     instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as</em></ins></span> a <span 
class="removed"><del><strong>data broker,
+    firewall to block connections</em></ins></span> to <span 
class="inserted"><ins><em>Vizio's servers. Or, as</em></ins></span> a <span 
class="removed"><del><strong>data broker,
 the data broker</strong></del></span> <span class="inserted"><ins><em>last 
resort,
     you</em></ins></span> can <span class="removed"><del><strong>figure out 
who the user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>replace your TV with another 
model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -429,29 +445,29 @@
 intentionally broke Revolv home automatic control products that depended 
on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>server&lt;/a&gt; to 
function.  The lesson is, don't stand for that! Insist
-on self-contained computers</strong></del></span> <span 
class="inserted"><ins><em>better
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span 
class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>run free software!&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;ARRIS cable modem has a &lt;a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor</strong></del></span> <span class="inserted"><ins><em>these
-    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>videos. That's not
-    security for your home. Security means making sure they don't get to
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't 
stand</strong></del></span> <span class="inserted"><ins><em>look at what's in 
the videos. That's not
+    security</em></ins></span> for <span class="removed"><del><strong>that! 
Insist
+on self-contained computers that run free 
software!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>your 
home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span>
+&lt;p&gt;ARRIS cable modem has a &lt;a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
-    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that</strong></del></span>
+    use <span class="removed"><del><strong>the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span> <span class="inserted"><ins><em>of independent 
replacement ink cartridges. Their &ldquo;security
     upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
 remote login access&lt;/a&gt; to them.  HP claims that this does not 
give</strong></del></span>
@@ -521,22 +537,22 @@
     broken devices continued. But we think</em></ins></span> that <span 
class="removed"><del><strong>article says that there was
 &ldquo;nothing wrong&rdquo; with designing</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue;
     it made</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>restrict users in</strong></del></span> <span 
class="inserted"><ins><em>some additional people.
-    The fundamental wrong was to design</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like putting a &ldquo;cheat 
me and mistreat me&rdquo;
-sign</strong></del></span> <span class="inserted"><ins><em>devices to 
depend</em></ins></span> on <span class="removed"><del><strong>your chest.  We 
should know better: we should condemn all companies</strong></del></span> <span 
class="inserted"><ins><em>something
-    else</em></ins></span> that <span class="removed"><del><strong>take 
advantage of people like him.  Indeed,</strong></del></span> <span 
class="inserted"><ins><em>didn't respect users' freedom.&lt;/p&gt;
+    The fundamental wrong was to design</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like 
putting</strong></del></span> <span class="inserted"><ins><em>devices to depend 
on something
+    else that didn't respect users' freedom.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
+    offers</em></ins></span> a <span class="removed"><del><strong>&ldquo;cheat 
me and mistreat me&rdquo;
+sign</strong></del></span> <span class="inserted"><ins><em>gratis electronic 
toothbrush that snoops</em></ins></span> on <span 
class="removed"><del><strong>your chest.  We should know better: we should 
condemn all companies</strong></del></span> <span class="inserted"><ins><em>its 
user by
     sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>take advantage of people like him.  
Indeed,</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts</em></ins></span> it <span 
class="inserted"><ins><em>presents. It</em></ins></span>
     is <span class="inserted"><ins><em>too bad that</em></ins></span> the 
<span class="removed"><del><strong>acceptance</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating the
@@ -600,205 +616,96 @@
 
 &lt;li&gt;
 &lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system</em></ins></span> has a <span 
class="removed"><del><strong>big</strong></del></span> <span 
class="inserted"><ins><em>grave</em></ins></span> security <span 
class="removed"><del><strong>hole;</strong></del></span> <span 
class="inserted"><ins><em>flaw.&lt;/p&gt;
+    it, the system</em></ins></span> has a <span 
class="removed"><del><strong>big</strong></del></span> <span 
class="inserted"><ins><em>grave</em></ins></span> security <span 
class="removed"><del><strong>hole; &lt;a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely</strong></del></span> <span 
class="inserted"><ins><em>flaw.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
-problem is partly the fault</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span class="removed"><del><strong>app 
developers. That is clearly true if</strong></del></span> the <span 
class="removed"><del><strong>apps are proprietary software.&lt;/p&gt;
-
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
-screw you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Malware found on &lt;a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;A camera that records locally on physical media, and has no network
-connection, does not threaten people with 
surveillance&mdash;neither</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
+  &lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices</em></ins></span> by <span 
class="removed"><del><strong>watching people through</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>camera, nor</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> through <span 
class="removed"><del><strong>malware in</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> the
-<span class="removed"><del><strong>camera.&lt;/p&gt;
-&lt;/li&gt;
+    all Harmony Link household</em></ins></span> control <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
-attackers</strong></del></span> <span class="inserted"><ins><em>products' 
supposed owners
+&lt;p&gt;Samsung claims that</strong></del></span> <span 
class="inserted"><ins><em>devices by &lt;a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off the server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this is</em></ins></span> to <span 
class="removed"><del><strong>send malware</strong></del></span> <span 
class="inserted"><ins><em>pressure them</em></ins></span> to <span 
class="removed"><del><strong>the devices, which can subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>buy a newer 
model. If
-    they are wise, they will learn, rather,</em></ins></span> to <span 
class="removed"><del><strong>computers and other FitBit 
trackers</strong></del></span> <span class="inserted"><ins><em>distrust any 
product</em></ins></span> that <span 
class="removed"><del><strong>interact</strong></del></span>
-    <span class="inserted"><ins><em>requires users to talk</em></ins></span> 
with
-<span class="removed"><del><strong>them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through some specialized 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The owners suspect</em></ins></span> this is <span 
class="inserted"><ins><em>to pressure them to buy a newer model. If
+    they are wise, they will learn, rather, to distrust any product that
+    requires users to talk with them through some specialized 
service.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the 
encryption</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
+  &lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate</em></ins></span> with
-<span class="removed"><del><strong>proprietary firmware so you can't trust it. 
 Western Digital's &lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which are used to administer drugs 
to</strong></del></span> <span class="inserted"><ins><em>it, 
is</em></ins></span> a <span class="removed"><del><strong>patient, were rated 
&ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>surveillance device. &lt;a
+    manufacturer can communicate with it, is a surveillance device. &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    Canary camera is</em></ins></span> an <span 
class="removed"><del><strong>&ldquo;open&rdquo; platform 
so</strong></del></span> <span 
class="inserted"><ins><em>example&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article describes wrongdoing</em></ins></span> by <span 
class="removed"><del><strong>a security
-researcher.&lt;/p&gt;
-
-&lt;p&gt;Depending</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer, based</em></ins></span> on <span 
class="removed"><del><strong>what drug is being infused,</strong></del></span>
-    the <span class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> the <span class="removed"><del><strong>door to 
murder.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Due</strong></del></span> <span class="inserted"><ins><em>device is 
tethered</em></ins></span> to <span class="removed"><del><strong>bad security 
in</strong></del></span> a <span class="removed"><del><strong>drug pump, 
crackers could use</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the
+<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on
+    the fact that the device</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>tethered to a server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But</em></ins></span> it <span class="inserted"><ins><em>also 
demonstrates that the device gives the company
+    &lt;p&gt;But it also demonstrates that</em></ins></span> the <span 
class="removed"><del><strong>fault</strong></del></span> <span 
class="inserted"><ins><em>device gives the company
     surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals is connected</em></ins></span> to <span 
class="inserted"><ins><em>the internet. Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly 
vulnerable</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    designed for hospitals is connected to the internet. Naturally &lt;a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to
-<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>crackers.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    referring to crackers.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished a company for making webcams with</strong></del></span> bad <span 
class="removed"><del><strong>security&lt;/a&gt; so
-that it was easy for anyone to watch them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;It is possible to &lt;a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill people by taking control of medical implants by radio&lt;/a&gt;.  More
-information</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> in <span 
class="removed"><del><strong>&lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Lots</strong></del></span> <span class="inserted"><ins><em>many 
Internet</em></ins></span> of <span class="inserted"><ins><em>Stings devices 
allows</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;, and it 
can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet</em></ins></span> of <span 
class="removed"><del><strong>app developers. That</strong></del></span> <span 
class="inserted"><ins><em>Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
     to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't</em></ins></span> be <span 
class="removed"><del><strong>fatal.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken over&lt;/a&gt; and turned
-into</strong></del></span> a <span class="removed"><del><strong>botnet 
for</strong></del></span> <span class="inserted"><ins><em>sucker&mdash;reject 
all</em></ins></span> the <span class="removed"><del><strong>purpose of 
collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>clearly true if</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>apps are proprietary software.&lt;/p&gt;
 
-  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
-&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201708230"&gt;
-    &lt;p&gt;Sonos</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used a firmware &ldquo;upgrade&rdquo; to make</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
-    told all</em></ins></span> its <span class="removed"><del><strong>TVs 
snoop on what
-users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
-&lt;/li&gt;
+&lt;p&gt;Anything whose name</strong></del></span> <span 
class="inserted"><ins><em>article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;LG</strong></del></span> <span class="inserted"><ins><em>customers, 
&ldquo;Agree&rdquo;
-    to snooping or the product will stop working&lt;/a&gt;.</em></ins></span>  
&lt;a
-<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-&ldquo;smart&rdquo; TVs, unless</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
-    Another article&lt;/a&gt; says they won't forcibly 
change</em></ins></span> the <span class="removed"><del><strong>purchasers 
agreed</strong></del></span> <span class="inserted"><ins><em>software, but
-    people won't be able</em></ins></span> to <span 
class="removed"><del><strong>let LG
-begin</strong></del></span> <span class="inserted"><ins><em>get any upgrades 
and eventually it will
+  &lt;li id="M201708230"&gt;
+    &lt;p&gt;Sonos &lt;a
+    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working&lt;/a&gt;.  &lt;a
+    
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
+    Another article&lt;/a&gt; says they won't forcibly change the software, but
+    people won't be able to get any upgrades and eventually it will
     stop working.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to snoop on <span class="removed"><del><strong>them and distribute their 
personal data.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie</strong></del></span> <span class="inserted"><ins><em>other people, 
DJI</em></ins></span> is <span class="removed"><del><strong>going to 
spy&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>in many 
cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>children and 
adults.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;Smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP IP phones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706200"&gt;
-    &lt;p&gt;Many models of Internet-connected cameras</em></ins></span>
-    are <span class="removed"><del><strong>spying devices&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>tremendously insecure.  They have login
-    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
-&ldquo;smart&rdquo; camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</em></ins></span>
-    is <span class="removed"><del><strong>always watching&lt;/a&gt;, even 
when</strong></del></span> <span class="inserted"><ins><em>no way to delete 
these accounts either&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201706200"&gt;
+    &lt;p&gt;Many models of Internet-connected cameras
+    are tremendously insecure.  They have login
+    accounts with hard-coded passwords, which can't be changed, and &lt;a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705250"&gt;
@@ -812,8 +719,7 @@
     &lt;p&gt;Bird and rabbit pets were implemented for Second
     Life by a company that tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down</em></ins></span> the
-<span class="removed"><del><strong>&ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>server and the 
pets more or less died&lt;/a&gt;.&lt;/p&gt;
+    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -825,7 +731,7 @@
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
-    would that make</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
+    would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -851,8 +757,8 @@
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="inserted"><ins><em>computerized vibrator &lt;a
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
@@ -1104,75 +1010,150 @@
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;
+    &lt;p&gt;It is possible to turn this off, but having it enabled by 
default</em></ins></span>
+    is <span class="removed"><del><strong>most likely going to
+screw you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>an 
injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical media, and has no network
+connection, does not threaten people</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>surveillance&mdash;neither
+by watching people through</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
+    to</em></ins></span> the <span class="removed"><del><strong>camera, nor 
through malware in</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
     users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a &lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+    &lt;p&gt;FitBit</em></ins></span> fitness trackers have a <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</em></ins></span>
     Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with them.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201510200"&gt;
-    &lt;p&gt;&ldquo;Self-encrypting&rdquo; disk drives
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
+    &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a
-    
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    can't trust it.  Western Digital's <span class="removed"><del><strong>&lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
 &ldquo;My Passport&rdquo; drives <span class="inserted"><ins><em>&lt;a
+    
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
     have a back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people</em></ins></span> are <span class="removed"><del><strong>used 
to administer drugs to
+a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>watching&lt;/a&gt;, 
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending on what drug is being infused, the insecurity could
+open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506080"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;</em></ins></span>
     &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished a company for making webcams with bad security&lt;/a&gt; so
+that it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs</em></ins></span> people <span 
class="removed"><del><strong>by taking control of medical implants by 
radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>watch, 
and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient, were rated &ldquo;&lt;a
+    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
-    the door to murder.&lt;/p&gt;
+    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
+    the door to murder.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -1224,72 +1205,90 @@
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405200.1"&gt;
+  &lt;li id="M201405200.1"&gt;</em></ins></span>
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;</em></ins></span>
-    &ldquo;smart&rdquo; <span class="removed"><del><strong>device 
means</strong></del></span> <span class="inserted"><ins><em>TVs, 
unless</em></ins></span> the <span class="removed"><del><strong>manufacturer is 
using it</strong></del></span> <span class="inserted"><ins><em>purchasers 
agreed</em></ins></span> to <span class="removed"><del><strong>outsmart
-you.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
-    to snoop</em></ins></span> on <span class="inserted"><ins><em>them and 
distribute</em></ins></span> their <span class="removed"><del><strong>users: 
their</strong></del></span> <span class="inserted"><ins><em>personal 
data.&lt;/p&gt;
+    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
-    &lt;p&gt;Lots of</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-&ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
-<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> can <span 
class="removed"><del><strong>track you 
-across devices.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going to spy&lt;/a&gt; on children</strong></del></span>
 
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>be fatal.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+    &lt;p&gt;Lots of &lt;a
+    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>adults.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it can be fatal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
-    &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
-    memories have modifiable software&lt;/a&gt;, which makes them 
vulnerable</em></ins></span>
-    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>viruses.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-    &lt;p&gt;We don't call</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;back door&rdquo; because</em></ins></span> 
it <span class="removed"><del><strong>enabled by default</strong></del></span> 
is <span class="removed"><del><strong>an injustice already.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a
+<span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to the 600
-millions social media profiles the company already monitors.  Tivo
-customers are unaware they're being watched by advertisers.  By
-combining TV viewing information with online social media
-participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>normal
-    that you</em></ins></span> can <span class="removed"><del><strong>now &lt;a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-users to</strong></del></span> <span class="inserted"><ins><em>install 
a</em></ins></span> new <span class="removed"><del><strong>combined 
surveillance by default.&lt;/p&gt;
-&lt;/li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554"&gt; 
Some flash
+    memories have modifiable software&lt;/a&gt;, which makes them vulnerable
+    to viruses.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>system in a 
computer, given physical access</em></ins></span>
-    to <span class="inserted"><ins><em>it.  However, memory sticks and cards 
should not</em></ins></span> be <span class="removed"><del><strong>picked
-up by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>modifiable in
-    this way.&lt;/p&gt;
+    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; 
because</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>normal
+    that you can install a new system in a computer, given physical 
access</em></ins></span>
+    to <span class="removed"><del><strong>outsmart
+you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it.  
However, memory sticks and cards should not be modifiable in
+    this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Vizio goes</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312040"&gt;
     &lt;p&gt;&lt;a
     
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-    Point-of-sale terminals</em></ins></span> running <span 
class="inserted"><ins><em>Windows were taken over&lt;/a&gt; and
-    turned into a botnet for the purpose of collecting customers' credit
+    Point-of-sale terminals running Windows were taken over&lt;/a&gt; and
+    turned into</em></ins></span> a <span class="removed"><del><strong>step 
further than other TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
     card numbers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311210"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>spying on 
+their users: their &lt;a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>LG</em></ins></span> &ldquo;smart&rdquo; TVs 
<span class="removed"><del><strong>analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+    reports what the user watches,</em></ins></span> and 
+<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers can track you 
+across devices.&lt;/p&gt;
+
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span 
class="removed"><del><strong>off, but having it enabled by default
+is an injustice already.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households 
to</strong></del></span> <span class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>600
+millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>company already monitors.  Tivo
+customers are unaware they're being watched by advertisers.  By
+combining TV viewing information with online social media
+participation, Tivo can now &lt;a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+users to new combined surveillance by default.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
@@ -1488,7 +1487,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2016, 2017, 
2018</strong></del></span> <span 
class="inserted"><ins><em>2016-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2016, 2017, 
2018</strong></del></span> <span 
class="inserted"><ins><em>2016-2021</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1499,7 +1498,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/30 10:33:45 $
+$Date: 2021/01/06 10:32:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- po/malware-appliances.de.po 30 Dec 2020 10:33:45 -0000      1.98
+++ po/malware-appliances.de.po 6 Jan 2021 10:32:24 -0000       1.99
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -146,6 +146,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -2351,10 +2363,10 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2016-] {+2016-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2016-] {+2016-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: po/malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- po/malware-appliances.es.po 31 Dec 2020 10:25:11 -0000      1.40
+++ po/malware-appliances.es.po 6 Jan 2021 10:32:24 -0000       1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-12-31 11:18+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -94,6 +95,49 @@
 "confiables que justifiquen su inclusión."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# | 
href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy
+# | Not Included&rdquo;</a> list <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\";>are-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+&ldquo;Minimum+} Security [-Standards\".-] {+Standards.&rdquo;+}
+# | Insecure design of the program running on some of these devices <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\";>makes-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/";
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
+msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+"La mayoría de los aparatos conectados a Internet que se encuentran en la "
+"lista de Mozilla <a href=\"https://foundation.mozilla.org/es/";
+"privacynotincluded\">«Privacidad no incluida»</a><a href=\"https://";
+"foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">están "
+"diseñados para espiar a los usuarios</a>, incluso cuando cumplen los "
+"«Estándares mínimos de seguridad» de Mozilla. El diseño inseguro del "
+"programa que se ejecuta en algunos de estos aparatos <a href=\"https://";
+"foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"
+"\">hace al usuario susceptible de ser espiado y también de ser presa de "
+"delincuentes informáticos</a>."
+
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
@@ -1895,7 +1939,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2016-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- po/malware-appliances.fr.po 30 Dec 2020 23:17:20 -0000      1.168
+++ po/malware-appliances.fr.po 6 Jan 2021 10:32:24 -0000       1.169
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-12-30 12:46+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -91,6 +92,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -1901,8 +1914,8 @@
 "infos nécessaires."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- po/malware-appliances.pot   30 Dec 2020 10:33:45 -0000      1.83
+++ po/malware-appliances.pot   6 Jan 2021 10:32:26 -0000       1.84
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,19 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a "
+"href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy "
+"Not Included&rdquo;</a> list <a "
+"href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are
 "
+"designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum "
+"Security Standards.&rdquo; Insecure design of the program running on some of "
+"these devices <a "
+"href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes
 "
+"the user susceptible to be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a "
@@ -1265,7 +1278,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- po/malware-appliances.ru.po 30 Dec 2020 11:32:11 -0000      1.204
+++ po/malware-appliances.ru.po 6 Jan 2021 10:32:26 -0000       1.205
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -93,6 +94,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -1882,8 +1895,8 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: po/malware-games.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-games.es-en.html 5 Jan 2021 11:02:25 -0000       1.15
+++ po/malware-games.es-en.html 6 Jan 2021 10:32:26 -0000       1.16
@@ -92,7 +92,7 @@
   </li>
 
   <li id="M202010210">
-    <p>Minecraft players are <a
+    <p>As of 2019-2020, Minecraft players are <a
     
href="https://www.minecraft.net/en-us/article/java-edition-moving-house";>being
     forced to move to Microsoft servers</a>, which results in
     privacy violation. Microsoft publishes a program so users can run
@@ -420,7 +420,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/01/05 11:02:25 $
+$Date: 2021/01/06 10:32:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-games.es.po      6 Jan 2021 10:19:10 -0000       1.44
+++ po/malware-games.es.po      6 Jan 2021 10:32:26 -0000       1.45
@@ -531,10 +531,9 @@
 "question_why_is_runescape_so_addicting/\">características adictivas</a> "
 "derivadas de <a href=\"/proprietary/proprietary-addictions.html#addictiveness"
 "\">técnicas de manipulación de conducta</a>. Algunos aspectos repetitivos "
-"del juego, como el <cite><a href=\"https://es.wikipedia.org/wiki/";
-"Grind_(videojuegos)\">grinding</a></cite>, se pueden minimizar mediante "
-"pago, induciendo así a niños y personas influenciables a gastar dinero en 
el "
-"juego."
+"del juego, como el <cite><a href=\"https://es.wikipedia.org/wiki/Grind_";
+"(videojuegos)\">grinding</a></cite>, se pueden minimizar mediante pago, "
+"induciendo así a niños y personas influenciables a gastar dinero en el 
juego."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-microsoft.es-en.html     5 Jan 2021 11:02:25 -0000       1.82
+++ po/malware-microsoft.es-en.html     6 Jan 2021 10:32:26 -0000       1.83
@@ -449,7 +449,7 @@
   </li>
 
   <li id="M202010210">
-    <p>Minecraft players are <a
+    <p>As of 2019-2020, Minecraft players are <a
     
href="https://www.minecraft.net/en-us/article/java-edition-moving-house";>being
     forced to move to Microsoft servers</a>, which results in
     privacy violation. Microsoft publishes a program so users can run
@@ -769,7 +769,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/01/05 11:02:25 $
+$Date: 2021/01/06 10:32:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- po/malware-microsoft.es.po  6 Jan 2021 10:19:10 -0000       1.204
+++ po/malware-microsoft.es.po  6 Jan 2021 10:32:26 -0000       1.205
@@ -939,17 +939,17 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\">nivel de "
 "telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder, "
 "entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/";
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- po/nl.po    6 Jan 2021 03:01:41 -0000       1.260
+++ po/nl.po    6 Jan 2021 10:32:26 -0000       1.261
@@ -2170,6 +2170,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -3252,11 +3264,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015, 2016-] {+2016-2020+} Free Software Foundation,
+# | Copyright &copy; [-2015, 2016-] {+2016-2021+} Free Software Foundation,
 # | Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3973,14 +3985,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2015, 2016-] {+2016-2021+} Free Software Foundation,
-# | Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Apple's Operating Systems are-]{+Google's Software Is+} Malware - GNU
 # | Project - Free Software Foundation
@@ -8628,18 +8632,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -8825,6 +8817,14 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015, 2016-] {+2016-2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/pl.po    6 Jan 2021 03:01:44 -0000       1.259
+++ po/pl.po    6 Jan 2021 10:32:26 -0000       1.260
@@ -1742,6 +1742,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -2824,11 +2836,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2016-2020+} Free Software
+# | Copyright &copy; [-2013, 2014, 2015-] {+2016-2021+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3534,14 +3546,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2016-2021+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
 # | Software Foundation
@@ -8131,18 +8135,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -8330,6 +8322,14 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2016-2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- po/pot      6 Jan 2021 03:01:45 -0000       1.258
+++ po/pot      6 Jan 2021 10:32:26 -0000       1.259
@@ -1539,6 +1539,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -2612,7 +2624,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>
@@ -3304,10 +3316,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr ""
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -7429,18 +7437,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -7609,6 +7605,10 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr ""

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- po/proprietary-surveillance.de-diff.html    6 Jan 2021 03:01:45 -0000       
1.153
+++ po/proprietary-surveillance.de-diff.html    6 Jan 2021 10:32:27 -0000       
1.154
@@ -2156,12 +2156,12 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed</em></ins></span> to <span class="removed"><del><strong>restrict
       the use</strong></del></span> <span class="inserted"><ins><em>snoop on 
users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the program running</em></ins></span> on <span 
class="inserted"><ins><em>some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
     the <span class="removed"><del><strong>user's computer, but it does 
surveillance
       too:</strong></del></span> <span class="inserted"><ins><em>user 
susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
@@ -3906,7 +3906,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:45 $
+$Date: 2021/01/06 10:32:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.366
retrieving revision 1.367
diff -u -b -r1.366 -r1.367
--- po/proprietary-surveillance.de.po   6 Jan 2021 03:01:45 -0000       1.366
+++ po/proprietary-surveillance.de.po   6 Jan 2021 10:32:27 -0000       1.367
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -3839,10 +3839,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- po/proprietary-surveillance.es.po   6 Jan 2021 10:19:11 -0000       1.129
+++ po/proprietary-surveillance.es.po   6 Jan 2021 10:32:27 -0000       1.130
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2021-01-06 11:12+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -441,17 +442,17 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\">nivel de "
 "telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder, "
 "entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/";
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2452,8 +2453,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "
@@ -3337,13 +3338,34 @@
 "\">#SpywareInEquipment</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# | 
href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy
+# | Not Included&rdquo;</a> list <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\";>are-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+&ldquo;Minimum+} Security [-Standards\".-] {+Standards.&rdquo;+}
+# | Insecure design of the program running on some of these devices <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\";>makes-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/";
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.583
retrieving revision 1.584
diff -u -b -r1.583 -r1.584
--- po/proprietary-surveillance.fr.po   6 Jan 2021 03:01:45 -0000       1.583
+++ po/proprietary-surveillance.fr.po   6 Jan 2021 10:32:27 -0000       1.584
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2021-01-04 17:56+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -3340,10 +3340,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary-surveillance.it-diff.html    6 Jan 2021 03:01:46 -0000       
1.219
+++ po/proprietary-surveillance.it-diff.html    6 Jan 2021 10:32:27 -0000       
1.220
@@ -2332,11 +2332,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3733,7 +3733,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:46 $
+$Date: 2021/01/06 10:32:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- po/proprietary-surveillance.it.po   6 Jan 2021 03:01:46 -0000       1.378
+++ po/proprietary-surveillance.it.po   6 Jan 2021 10:32:27 -0000       1.379
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -3606,10 +3606,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- po/proprietary-surveillance.ja-diff.html    6 Jan 2021 03:01:46 -0000       
1.237
+++ po/proprietary-surveillance.ja-diff.html    6 Jan 2021 10:32:27 -0000       
1.238
@@ -2365,11 +2365,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3609,7 +3609,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:46 $
+$Date: 2021/01/06 10:32:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.360
retrieving revision 1.361
diff -u -b -r1.360 -r1.361
--- po/proprietary-surveillance.ja.po   6 Jan 2021 03:01:48 -0000       1.360
+++ po/proprietary-surveillance.ja.po   6 Jan 2021 10:32:27 -0000       1.361
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -2802,10 +2802,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary-surveillance.pot     6 Jan 2021 03:01:49 -0000       1.299
+++ po/proprietary-surveillance.pot     6 Jan 2021 10:32:27 -0000       1.300
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2259,11 +2259,11 @@
 "Most Internet connected devices in Mozilla's <a "
 "href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy "
 "Not Included&rdquo;</a> list <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\";>are
 "
-"designed to snoop on users</a> even if they meet Mozilla's \"Minimum "
-"Security Standards\". Insecure design of the program running on some of "
+"href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are
 "
+"designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum "
+"Security Standards.&rdquo; Insecure design of the program running on some of "
 "these devices <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\";>makes
 "
+"href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes
 "
 "the user susceptible to be snooped and exploited by crackers as well</a>."
 msgstr ""
 

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.667
retrieving revision 1.668
diff -u -b -r1.667 -r1.668
--- po/proprietary-surveillance.ru.po   6 Jan 2021 03:01:49 -0000       1.667
+++ po/proprietary-surveillance.ru.po   6 Jan 2021 10:32:27 -0000       1.668
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -3311,10 +3311,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- po/proprietary.de-diff.html 6 Jan 2021 03:01:49 -0000       1.213
+++ po/proprietary.de-diff.html 6 Jan 2021 10:32:28 -0000       1.214
@@ -216,11 +216,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -334,7 +334,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:49 $
+$Date: 2021/01/06 10:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- po/proprietary.de.po        6 Jan 2021 03:01:50 -0000       1.251
+++ po/proprietary.de.po        6 Jan 2021 10:32:28 -0000       1.252
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -467,10 +467,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- po/proprietary.es.po        6 Jan 2021 10:19:10 -0000       1.378
+++ po/proprietary.es.po        6 Jan 2021 10:32:28 -0000       1.379
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -318,13 +319,34 @@
 msgstr "Añadidos recientes"
 
 #. type: Content of: <div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# | 
href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy
+# | Not Included&rdquo;</a> list <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\";>are-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+&ldquo;Minimum+} Security [-Standards\".-] {+Standards.&rdquo;+}
+# | Insecure design of the program running on some of these devices <a
+# | 
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\";>makes-]
+# | 
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/";
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation.";
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.423
retrieving revision 1.424
diff -u -b -r1.423 -r1.424
--- po/proprietary.fr.po        6 Jan 2021 03:01:50 -0000       1.423
+++ po/proprietary.fr.po        6 Jan 2021 10:32:28 -0000       1.424
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2021-01-05 16:49+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -326,10 +326,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/proprietary.it-diff.html 6 Jan 2021 03:01:50 -0000       1.225
+++ po/proprietary.it-diff.html 6 Jan 2021 10:32:28 -0000       1.226
@@ -215,11 +215,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -333,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:50 $
+$Date: 2021/01/06 10:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- po/proprietary.it.po        6 Jan 2021 03:01:50 -0000       1.260
+++ po/proprietary.it.po        6 Jan 2021 10:32:28 -0000       1.261
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -472,10 +472,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- po/proprietary.ja-diff.html 6 Jan 2021 03:01:51 -0000       1.230
+++ po/proprietary.ja-diff.html 6 Jan 2021 10:32:28 -0000       1.231
@@ -214,11 +214,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -332,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:51 $
+$Date: 2021/01/06 10:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- po/proprietary.ja.po        6 Jan 2021 03:01:51 -0000       1.244
+++ po/proprietary.ja.po        6 Jan 2021 10:32:28 -0000       1.245
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -330,10 +330,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- po/proprietary.nl-diff.html 6 Jan 2021 03:01:51 -0000       1.226
+++ po/proprietary.nl-diff.html 6 Jan 2021 10:32:28 -0000       1.227
@@ -215,11 +215,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -333,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:51 $
+$Date: 2021/01/06 10:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- po/proprietary.nl.po        6 Jan 2021 03:01:52 -0000       1.234
+++ po/proprietary.nl.po        6 Jan 2021 10:32:28 -0000       1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -375,10 +375,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- po/proprietary.pl-diff.html 6 Jan 2021 03:01:52 -0000       1.243
+++ po/proprietary.pl-diff.html 6 Jan 2021 10:32:28 -0000       1.244
@@ -214,11 +214,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -332,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:52 $
+$Date: 2021/01/06 10:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- po/proprietary.pl.po        6 Jan 2021 03:01:52 -0000       1.227
+++ po/proprietary.pl.po        6 Jan 2021 10:32:28 -0000       1.228
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -556,10 +556,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/proprietary.pot  6 Jan 2021 03:01:57 -0000       1.224
+++ po/proprietary.pot  6 Jan 2021 10:32:28 -0000       1.225
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -266,11 +266,11 @@
 "Most Internet connected devices in Mozilla's <a "
 "href=\"https://foundation.mozilla.org/en/privacynotincluded\";>&ldquo;Privacy "
 "Not Included&rdquo;</a> list <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\";>are
 "
-"designed to snoop on users</a> even if they meet Mozilla's \"Minimum "
-"Security Standards\". Insecure design of the program running on some of "
+"href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\";>are
 "
+"designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum "
+"Security Standards.&rdquo; Insecure design of the program running on some of "
 "these devices <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\";>makes
 "
+"href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\";>makes
 "
 "the user susceptible to be snooped and exploited by crackers as well</a>."
 msgstr ""
 

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.374
retrieving revision 1.375
diff -u -b -r1.374 -r1.375
--- po/proprietary.pt-br.po     6 Jan 2021 03:01:57 -0000       1.374
+++ po/proprietary.pt-br.po     6 Jan 2021 10:32:28 -0000       1.375
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2021-01-05 16:36-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -320,10 +320,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.449
retrieving revision 1.450
diff -u -b -r1.449 -r1.450
--- po/proprietary.ru.po        6 Jan 2021 03:01:57 -0000       1.449
+++ po/proprietary.ru.po        6 Jan 2021 10:32:28 -0000       1.450
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -329,10 +329,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/proprietary.tr.po        6 Jan 2021 03:01:57 -0000       1.102
+++ po/proprietary.tr.po        6 Jan 2021 10:32:28 -0000       1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-12-17 18:19+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -321,10 +321,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- po/proprietary.zh-cn.po     6 Jan 2021 03:01:58 -0000       1.129
+++ po/proprietary.zh-cn.po     6 Jan 2021 10:32:28 -0000       1.130
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2021-01-05 12:30+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -302,10 +302,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- po/proprietary.zh-tw-diff.html      6 Jan 2021 03:01:58 -0000       1.206
+++ po/proprietary.zh-tw-diff.html      6 Jan 2021 10:32:28 -0000       1.207
@@ -216,11 +216,11 @@
     &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell"&gt;are
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
-    Mozilla's "Minimum Security Standards". Insecure
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -334,7 +334,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/06 03:01:58 $
+$Date: 2021/01/06 10:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- po/proprietary.zh-tw.po     6 Jan 2021 03:01:58 -0000       1.214
+++ po/proprietary.zh-tw.po     6 Jan 2021 10:32:28 -0000       1.215
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -445,10 +445,10 @@
 msgid ""
 "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
 "privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
 "be snooped and exploited by crackers as well</a>."
 msgstr ""

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- po/pt-br.po 6 Jan 2021 03:01:58 -0000       1.329
+++ po/pt-br.po 6 Jan 2021 10:32:28 -0000       1.330
@@ -1911,6 +1911,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -3217,7 +3229,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -4113,12 +4125,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9257,18 +9263,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -9473,6 +9467,12 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.552
retrieving revision 1.553
diff -u -b -r1.552 -r1.553
--- po/ru.po    6 Jan 2021 03:01:59 -0000       1.552
+++ po/ru.po    6 Jan 2021 10:32:29 -0000       1.553
@@ -2240,6 +2240,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -3880,8 +3892,8 @@
 "тиранами</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4946,10 +4958,6 @@
 "компьютере игрока, и выдает изрядное 
количество личных данных</a>, включая "
 "массу действий, никак не связанных с 
обманом."
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11117,18 +11125,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -11368,6 +11364,10 @@
 "Ниже приводятся примеры подписки на 
программы, которые нанесли пользователям "
 "непосредственный вред."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
 msgstr ""

Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- po/tr.po    6 Jan 2021 03:01:59 -0000       1.112
+++ po/tr.po    6 Jan 2021 10:32:29 -0000       1.113
@@ -1682,6 +1682,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -2812,7 +2824,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3608,12 +3620,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8194,18 +8200,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -8405,6 +8399,12 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"

Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- po/zh-cn.po 6 Jan 2021 03:02:00 -0000       1.113
+++ po/zh-cn.po 6 Jan 2021 10:32:29 -0000       1.114
@@ -1678,6 +1678,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -2809,7 +2821,7 @@
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
 #| "Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
 "Software Foundation, Inc."
@@ -3565,16 +3577,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
-#| "Software Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
-"Software Foundation, Inc."
-
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8009,18 +8011,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -8217,6 +8207,16 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/zh-tw.po 6 Jan 2021 03:02:01 -0000       1.259
+++ po/zh-tw.po 6 Jan 2021 10:32:29 -0000       1.260
@@ -1739,6 +1739,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
+"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-";
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"&ldquo;Minimum Security Standards.&rdquo; Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/";
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Some Wavelink and JetStream wifi routers have universal back doors that "
 "enable unauthenticated users to remotely control not only the routers, but "
 "also any devices connected to the network. There is evidence that <a href="
@@ -2817,13 +2829,13 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2020+} Free
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2021+} Free
 # | Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
-msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -3533,18 +3545,6 @@
 "to do with cheating."
 msgstr ""
 
-#. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2021+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid "Copyright &copy; 2016-2021 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
 #. type: Content of: <title>
 # | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
 # | Software Foundation
@@ -8031,18 +8031,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
-"mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-";
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/";
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "
@@ -8232,6 +8220,18 @@
 "below."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2016-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
 # | Foundation



reply via email to

[Prev in Thread] Current Thread [Next in Thread]