www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 12 Jan 2021 04:03:18 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/01/12 04:03:17

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.es.po malware-cars.fr.po 
                         malware-cars.pot malware-cars.ru.po 
                         malware-games.de-diff.html malware-games.de.po 
                         malware-games.es.po malware-games.fr.po 
                         malware-games.ja-diff.html malware-games.ja.po 
                         malware-games.pot malware-games.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-addictions.es.po 
                         proprietary-addictions.fr.po 
                         proprietary-addictions.pot 
                         proprietary-addictions.ru.po 
                         proprietary-addictions.tr.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.587&r2=1.588
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.671&r2=1.672
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.429&r2=1.430
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.455&r2=1.456
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.565&r2=1.566
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.266&r2=1.267

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- de.po       11 Jan 2021 09:34:34 -0000      1.266
+++ de.po       12 Jan 2021 09:03:10 -0000      1.267
@@ -5235,7 +5235,7 @@
 # | car's location at any time. (See [-<a
 # | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
 # | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
+# | 
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 # | privacy statement</a>.)+} The company says it doesn't store this
 # | information, but if the state orders it to get the data and hand it over,
 # | the state can store it.
@@ -5250,7 +5250,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -5337,10 +5337,10 @@
 "\">Automotive Security And Privacy Center</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2017-] {+2017-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2017-] {+2017-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5628,12 +5628,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -6696,6 +6697,13 @@
 "‚cracken‘</i>). Glücklicherweise sind die meisten Android-Geräte keine "
 "Tyrannen."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2017-] {+2017-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Malware in [-Appliances-] {+Online Conferencing+} - GNU Project - Free
 # | Software Foundation
@@ -10664,7 +10672,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -10741,9 +10749,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>
@@ -14540,6 +14555,32 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Tesla cars allow the company to extract data remotely and determine the "
+#~| "car's location at any time.  (See <a href=\"http://www.teslamotors.com/";
+#~| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~| "\"> Section 2, paragraphs b and c.</a>).  The company says it doesn't "
+#~| "store this information, but if the state orders it to get the data and "
+#~| "hand it over, the state can store it."
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Fahrzeuge des amerikanischen Herstellers Tesla ermöglichen dem "
+#~ "Unternehmen Datenmaterial mittels Fernzugriff abzugreifen und jederzeit "
+#~ "die Position des Fahrzeugs zu bestimmen (siehe <a href=\"//www."
+#~ "teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\" type=\"application/pdf"
+#~ "\" hreflang=\"en\">Datenschutzerklärung, Abschnitt 2 Abs. b und c</a>). "
+#~ "Das Unternehmen gibt an, dass es diese Informationen nicht speichert, "
+#~ "aber wenn staatliche Stellen deren Aushändigung anordnen und die Daten "
+#~ "übergeben werden, könnte der Staat sie speichern."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- es.po       11 Jan 2021 09:34:34 -0000      1.378
+++ es.po       12 Jan 2021 09:03:12 -0000      1.379
@@ -4938,10 +4938,25 @@
 "la locura</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -4952,7 +4967,7 @@
 "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
 "\">declaración de privacidad</a>). La compañía afirma que no guarda esa "
 "información, pero si el Estado le ordena obtener los datos y entregarlos, el 
"
-"Estado los puede guardar. "
+"Estado los puede guardar."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -5000,7 +5015,10 @@
 "Center</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5450,13 +5468,32 @@
 "puedan ejecutarse en otros sistemas</a>."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Muchos populares juegos para móviles están basados en el sistema "
 "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
@@ -6670,6 +6707,10 @@
 "restricción). Afortunadamente, la mayoría de los dispositivos Android no 
son "
 "tiranos."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Malware in [-Mobile Devices-] {+Online Conferencing+} - GNU Project - Free
 # | Software Foundation
@@ -10754,9 +10795,21 @@
 msgstr "Juegos"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# | 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -10881,26 +10934,11 @@
 "adictos a un juego."
 
 #. type: Content of: <div><div><ul><li>
-# | &ldquo;Loot boxes&rdquo; are a direct application of the random reward
-# | mechanism, and their addictiveness is enhanced by seductive animation.
-# | They are <a
-# | 
href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\";>
-# | akin to [-gambling</a>.-] {+gambling</a>, and so are the <a
-# | href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very
-# | popular in Asia, which may be considered the ancestors of loot boxes.+}
-#, fuzzy
-#| msgid ""
-#| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
-#| "mechanism, and their addictiveness is enhanced by seductive animation. "
-#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
-#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgid ""
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "Las «cajas de botín» (<cite>loot boxes</cite>) son una aplicación directa 
"
 "del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
@@ -10909,6 +10947,15 @@
 "juegos de apuestas</a>."
 
 #. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
 # | The {+developers of gratis mobile games apply the techniques described
 # | above to <a
 # | href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\";>
@@ -14780,10 +14827,65 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Los automóviles Tesla permiten que la compañía extraiga datos de manera 
"
+#~ "remota para determinar la ubicación del vehículo en cualquier momento "
+#~ "(véase la Sección 2, párrafos b y c de la <a href=\"http://www.";
+#~ "teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\">declaración de "
+#~ "privacidad</a>). La compañía afirma que no guarda esa información, pero 
"
+#~ "si el Estado le ordena obtener los datos y entregarlos, el Estado los "
+#~ "puede guardar. "
+
+#~ msgid ""
+#~ "Many popular mobile games are based on the gacha system, which has been "
+#~ "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#~ "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#~ "variants are still exploiting users</a>."
+#~ msgstr ""
+#~ "Muchos populares juegos para móviles están basados en el sistema "
+#~ "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
+#~ "tragamonedas desde 2010. El «<cite>gacha</cite> completo» se declaró "
+#~ "ilegal en Japón en 2012, pero <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\">las variantes legales siguen explotando a los "
+#~ "usuarios</a>."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muchos juegos están diseñados para que los jugadores continúen jugando "
+#~ "compulsivamente y renueven su suscripción. Para conseguirlo, los "
+#~ "desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
+#~ "derivadas de la investigación del cerebro y de la conducta</a>:"
+
+#, fuzzy
+#~| msgid ""
+#~| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
+#~| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#~| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
+#~| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ msgid ""
 #~ "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 #~ "mechanism, and their addictiveness is enhanced by seductive animation. "
 #~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
-#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
 #~ msgstr ""
 #~ "Las «cajas de botín» (<cite>loot boxes</cite>) son una aplicación 
directa "
 #~ "del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- fr.po       11 Jan 2021 12:25:24 -0000      1.470
+++ fr.po       12 Jan 2021 09:03:12 -0000      1.471
@@ -4360,10 +4360,25 @@
 "démence</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -4424,7 +4439,10 @@
 "Privacy Center</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -4774,13 +4792,32 @@
 "systèmes</a>."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Beaucoup de jeux populaires sur mobiles sont basés sur le système 
<i>gacha</"
 "i>, qui transforme les téléphones en machines à sous depuis 2010. Le "
@@ -5770,6 +5807,10 @@
 "\">des téléphones Android qui sont des tyrans</a> (bien que quelqu'un ait "
 "trouvé moyen de briser ces restrictions)."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9324,9 +9365,21 @@
 msgstr "Jeux"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# | 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -9424,13 +9477,28 @@
 msgstr "Il y a des moyens encore plus élaborés de rendre les jeux addictifs."
 
 #. type: Content of: <div><div><ul><li>
+# | &ldquo;Loot boxes&rdquo; are a direct application of the random reward
+# | mechanism, and their addictiveness is enhanced by seductive animation.
+# | They are <a
+# | 
href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\";>
+# | akin to [-gambling</a>, and so are the <a
+# | href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very
+# | popular in Asia, which may be considered the ancestors of loot boxes.-]
+# | {+gambling</a>.+}
+#, fuzzy
+#| msgid ""
+#| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
+#| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
+#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#| "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</"
+#| "a>, very popular in Asia, which may be considered the ancestors of loot "
+#| "boxes."
 msgid ""
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "Les « boîtes à butin » sont une application directe du mécanisme de "
 "récompense aléatoire. De plus leur pouvoir addictif est amplifié par des "
@@ -9442,6 +9510,15 @@
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -12716,3 +12793,66 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Les véhicules Tesla permettent à cette société d'extraire des données 
à "
+#~ "distance et de localiser la voiture à chaque instant (voir la section 2, 
"
+#~ "paragraphes b et c de la <a href=\"http://www.teslamotors.com/sites/";
+#~ "default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~ "\">déclaration de confidentialité</a>). La société dit qu'elle ne "
+#~ "conserve pas cette information, mais déclare que si l'État lui donne "
+#~ "l'ordre de récupérer ces données et de les lui transmettre, l'État 
peut "
+#~ "les conserver."
+
+#~ msgid ""
+#~ "Many popular mobile games are based on the gacha system, which has been "
+#~ "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#~ "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#~ "variants are still exploiting users</a>."
+#~ msgstr ""
+#~ "Beaucoup de jeux populaires sur mobiles sont basés sur le système "
+#~ "<i>gacha</i>, qui transforme les téléphones en machines à sous depuis "
+#~ "2010. Le « <i>gacha</i> complet » est illégal au Japon depuis 2012, 
mais "
+#~ "<a href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-";
+#~ "mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">les "
+#~ "variantes légales continuent à exploiter les utilisateurs</a>."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
+#~ "joueurs compulsifs – et continuent à payer leur abonnement. Pour 
obtenir "
+#~ "ce résultat, les développeurs appliquent des <a 
href=\"http://www.cracked.";
+#~ "com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-"
+#~ "addicted.html\">techniques issues de recherches comportementales et sur "
+#~ "le cerveau</a> :"
+
+#~ msgid ""
+#~ "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
+#~ "mechanism, and their addictiveness is enhanced by seductive animation. "
+#~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
+#~ msgstr ""
+#~ "Les « boîtes à butin » sont une application directe du mécanisme de 
"
+#~ "récompense aléatoire. De plus leur pouvoir addictif est amplifié par 
des "
+#~ "animations séduisantes. Elles sont <a href=\"https://www.pcgamer.com/";
+#~ "behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\">très "
+#~ "semblables à des jeux en ligne</a>, de même que les <a href=\"https://";
+#~ "wikipedia.org/wiki/Gacha_game\">jeux <i>gacha</i></a>, très populaires en 
"
+#~ "Asie, qui peuvent être considérés comme les ancêtres des boîtes à 
butin."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- it.po       11 Jan 2021 09:34:34 -0000      1.266
+++ it.po       12 Jan 2021 09:03:12 -0000      1.267
@@ -4856,7 +4856,7 @@
 # | car's location at any time. (See [-<a
 # | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
 # | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
+# | 
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 # | privacy statement</a>.)+} The company says it doesn't store this
 # | information, but if the state orders it to get the data and hand it over,
 # | the state can store it.
@@ -4871,7 +4871,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -4957,10 +4957,10 @@
 "faq.html\">Ulteriori informazioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014-2017-] {+2017-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-2017-] {+2017-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -5234,12 +5234,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -6261,6 +6262,13 @@
 "qualcuno ha trovato un modo per aggirare la limitazione). Fortunatamente, la "
 "maggior parte dei dispositivi Android non sono tiranni."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014-2017-] {+2017-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Malware in [-Mobile Devices-] {+Online Conferencing+} - GNU Project - Free
 # | Software Foundation
@@ -9904,7 +9912,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -9981,9 +9989,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>
@@ -13625,6 +13640,30 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Tesla cars allow the company to extract data remotely and determine the "
+#~| "car's location at any time. (See <a href=\"http://www.teslamotors.com/";
+#~| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
+#~| "store this information, but if the state orders it to get the data and "
+#~| "hand it over, the state can store it."
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Le automobili Tesla permettono alla società di estrarre dati a distanza e 
"
+#~ "di determinare la posizione del veicolo in qualsiasi momento. (Vedere <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\">Sezione 2, paragrafi b "
+#~ "e c</a>.). La società sostiene di non raccogliere queste informazioni, ma 
"
+#~ "se il governo dovesse ordinare di farlo e di consegnare le informazioni, "
+#~ "questo potrebbe raccoglierle."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- ja.po       11 Jan 2021 09:34:35 -0000      1.274
+++ ja.po       12 Jan 2021 09:03:12 -0000      1.275
@@ -3759,7 +3759,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3821,9 +3821,9 @@
 
 #. type: Content of: <div><p>
 #, fuzzy
-#| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
+#| msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -4077,12 +4077,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4885,6 +4886,12 @@
 "制限を破壊する方法をみつけだ
しましたが)。幸いなことに、多くのアンドロイドのデ"
 "バイスは暴君ではありません。"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -7727,7 +7734,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -7804,9 +7811,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>
@@ -10798,6 +10812,28 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Tesla cars allow the company to extract data remotely and determine the "
+#~| "car's location at any time. (See <a href=\"http://www.teslamotors.com/";
+#~| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
+#~| "store this information, but if the state orders it to get the data and "
+#~| "hand it over, the state can store it."
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Tesla社の車はTesla社が遠
隔でデータを抽出し、車の位置を常時知ることができま"
+#~ "す。(<a href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> 
セクション2、パラグラフ"
+#~ "bとc</a>をご覧ください)。Tesla社はこの情å 
±ã‚’保管しないと言いますが、国がそ"
+#~ 
"のデータを取得して引き渡すように命令すれば、国は保管できます。"
+
+#, fuzzy
+#~| msgid ""
 #~| "As of January, 2017, the files in this directory list around 260 "
 #~| "instances of malicious functionalities, but there are surely thousands "
 #~| "more we don't know about."

Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- malware-cars.de-diff.html   17 Oct 2020 08:05:07 -0000      1.39
+++ malware-cars.de-diff.html   12 Jan 2021 09:03:12 -0000      1.40
@@ -271,9 +271,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201608110"&gt;
-    &lt;p&gt;Due to weak security, &lt;a
+    &lt;p&gt;Due</em></ins></span> to <span 
class="removed"><del><strong>conceal.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>weak security, &lt;a
     
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
-    is easy</em></ins></span> to <span 
class="removed"><del><strong>conceal.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>open the doors of 100 million cars built by
+    is easy to open the doors of 100 million cars built by
     Volkswagen&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
@@ -369,7 +369,7 @@
     at any time. (See Section 2, paragraphs b and c of the</em></ins></span> 
&lt;a
 <span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
 snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
     information, but if the state orders it to get the data and hand it
     over, the state can store it.&lt;/p&gt;</em></ins></span>
@@ -462,7 +462,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017-2020</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017-2021</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -473,7 +473,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/17 08:05:07 $
+$Date: 2021/01/12 09:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-cars.de.po  17 Oct 2020 08:05:07 -0000      1.29
+++ malware-cars.de.po  12 Jan 2021 09:03:12 -0000      1.30
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -597,7 +597,7 @@
 # | car's location at any time. (See [-<a
 # | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
 # | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
+# | 
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 # | privacy statement</a>.)+} The company says it doesn't store this
 # | information, but if the state orders it to get the data and hand it over,
 # | the state can store it.
@@ -612,7 +612,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -752,10 +752,10 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2017-] {+2017-2020+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2017-] {+2017-2021+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2017 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-cars.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-cars.es.po  17 Oct 2020 11:29:04 -0000      1.14
+++ malware-cars.es.po  12 Jan 2021 09:03:12 -0000      1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-10-17 13:15+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -514,10 +515,25 @@
 "la locura</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -621,7 +637,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-cars.fr.po  30 Nov 2020 13:23:44 -0000      1.49
+++ malware-cars.fr.po  12 Jan 2021 09:03:12 -0000      1.50
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -510,10 +511,25 @@
 "démence</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -616,7 +632,10 @@
 "infos nécessaires."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-cars.pot    17 Oct 2020 08:05:07 -0000      1.23
+++ malware-cars.pot    12 Jan 2021 09:03:12 -0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -361,7 +361,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 "
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 "
 "privacy statement</a>.) The company says it doesn't store this information, "
 "but if the state orders it to get the data and hand it over, the state can "
 "store it."
@@ -431,7 +431,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-cars.ru.po  19 Oct 2020 10:00:04 -0000      1.54
+++ malware-cars.ru.po  12 Jan 2021 09:03:12 -0000      1.55
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -505,10 +506,25 @@
 "приводить потребителей в бешенство</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -609,7 +625,10 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-games.de-diff.html  8 Jan 2021 15:04:05 -0000       1.56
+++ malware-games.de-diff.html  12 Jan 2021 09:03:12 -0000      1.57
@@ -107,15 +107,15 @@
   &lt;/li&gt;
 
   &lt;li id="M202010220"&gt;
-    &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
-    
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
+    &lt;p&gt;The addictive Genshin Impact relentlessly</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
     players to spend money by overwhelming the game play with loot
     boxes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202010210"&gt;
-    &lt;p&gt;As of 2019-2020, Minecraft players are</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
+    &lt;p&gt;As of 2019-2020, Minecraft players are &lt;a
+    
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
     forced to move to Microsoft servers&lt;/a&gt;, which results in
     privacy violation. Microsoft publishes a program so users can run
     their own server, but the program is proprietary</em></ins></span> and
@@ -193,34 +193,34 @@
     &lt;p&gt;A nonfree video game, available through</em></ins></span> the 
<span class="removed"><del><strong>developer's awareness</strong></del></span> 
<span class="inserted"><ins><em>nonfree Steam client, &lt;a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an 
executable</em></ins></span> that <span 
class="inserted"><ins><em>hijacks</em></ins></span>
-    the <span class="removed"><del><strong>users would be 
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users' 
computers</em></ins></span> to <span class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> <span 
class="inserted"><ins><em>mine a cryptocurrency.&lt;/p&gt;
+    the <span class="removed"><del><strong>users would be 
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users' 
computers to mine a cryptocurrency.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
     MacOS was tethered to a server.  The company &lt;a
     
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
-    shut down</em></ins></span> the <span 
class="removed"><del><strong>developer</strong></del></span> <span 
class="inserted"><ins><em>server, and all copies stopped 
working&lt;/a&gt;.&lt;/p&gt;
+    shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>impose some.
-&lt;/p&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> the <span 
class="removed"><del><strong>developer</strong></del></span> <span 
class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>snoop on 
all open processes running on its user's computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712060"&gt;
@@ -229,8 +229,8 @@
     gratis-to-play-and-not-win-much games manipulate their useds
     psychologically&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;These manipulative behaviors are malicious functionalities, and 
they</em></ins></span>
-    are <span class="removed"><del><strong>examples</strong></del></span> 
<span class="inserted"><ins><em>possible because the game is proprietary. If it 
were free, people
+    &lt;p&gt;These manipulative behaviors</em></ins></span> are <span 
class="removed"><del><strong>examples</strong></del></span> <span 
class="inserted"><ins><em>malicious functionalities, and they
+    are possible because the game is proprietary. If it were free, people
     could publish a non-manipulative version and play that instead.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -284,12 +284,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
@@ -482,7 +483,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-games.de.po 8 Jan 2021 15:04:05 -0000       1.57
+++ malware-games.de.po 12 Jan 2021 09:03:12 -0000      1.58
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -421,12 +421,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- malware-games.es.po 9 Jan 2021 10:59:51 -0000       1.48
+++ malware-games.es.po 12 Jan 2021 09:03:12 -0000      1.49
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-09 11:38+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -430,13 +431,32 @@
 "ejecutarse en otros sistemas</a>."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Muchos populares juegos para móviles están basados en el sistema "
 "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "

Index: malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- malware-games.fr.po 8 Jan 2021 16:10:45 -0000       1.102
+++ malware-games.fr.po 12 Jan 2021 09:03:12 -0000      1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-08 17:08+0100\n"
 "Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -428,13 +429,32 @@
 "systèmes</a>."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Beaucoup de jeux populaires sur mobiles sont basés sur le système 
<i>gacha</"
 "i>, qui transforme les téléphones en machines à sous depuis 2010. Le "

Index: malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-games.ja-diff.html  8 Jan 2021 15:04:05 -0000       1.65
+++ malware-games.ja-diff.html  12 Jan 2021 09:03:12 -0000      1.66
@@ -107,15 +107,15 @@
   &lt;/li&gt;
 
   &lt;li id="M202010220"&gt;
-    &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
-    
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
+    &lt;p&gt;The addictive Genshin Impact relentlessly</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
     players to spend money by overwhelming the game play with loot
     boxes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202010210"&gt;
-    &lt;p&gt;As of 2019-2020, Minecraft players are</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
+    &lt;p&gt;As of 2019-2020, Minecraft players are &lt;a
+    
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
     forced to move to Microsoft servers&lt;/a&gt;, which results in
     privacy violation. Microsoft publishes a program so users can run
     their own server, but the program is proprietary</em></ins></span> and
@@ -193,34 +193,34 @@
     &lt;p&gt;A nonfree video game, available through</em></ins></span> the 
<span class="removed"><del><strong>developer's awareness</strong></del></span> 
<span class="inserted"><ins><em>nonfree Steam client, &lt;a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an 
executable</em></ins></span> that <span 
class="inserted"><ins><em>hijacks</em></ins></span>
-    the <span class="removed"><del><strong>users would be 
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users' 
computers</em></ins></span> to <span class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> <span 
class="inserted"><ins><em>mine a cryptocurrency.&lt;/p&gt;
+    the <span class="removed"><del><strong>users would be 
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users' 
computers to mine a cryptocurrency.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
     MacOS was tethered to a server.  The company &lt;a
     
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
-    shut down</em></ins></span> the <span 
class="removed"><del><strong>developer</strong></del></span> <span 
class="inserted"><ins><em>server, and all copies stopped 
working&lt;/a&gt;.&lt;/p&gt;
+    shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>impose some.
-&lt;/p&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> the <span 
class="removed"><del><strong>developer</strong></del></span> <span 
class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>snoop on 
all open processes running on its user's computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712060"&gt;
@@ -229,8 +229,8 @@
     gratis-to-play-and-not-win-much games manipulate their useds
     psychologically&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;These manipulative behaviors are malicious functionalities, and 
they</em></ins></span>
-    are <span class="removed"><del><strong>examples</strong></del></span> 
<span class="inserted"><ins><em>possible because the game is proprietary. If it 
were free, people
+    &lt;p&gt;These manipulative behaviors</em></ins></span> are <span 
class="removed"><del><strong>examples</strong></del></span> <span 
class="inserted"><ins><em>malicious functionalities, and they
+    are possible because the game is proprietary. If it were free, people
     could publish a non-manipulative version and play that instead.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -284,12 +284,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
@@ -482,7 +483,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-games.ja.po 8 Jan 2021 15:04:05 -0000       1.57
+++ malware-games.ja.po 12 Jan 2021 09:03:12 -0000      1.58
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -354,12 +354,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- malware-games.pot   8 Jan 2021 15:04:05 -0000       1.50
+++ malware-games.pot   12 Jan 2021 09:03:12 -0000      1.51
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -298,11 +298,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
 
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
 "
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-games.ru.po 10 Jan 2021 08:31:39 -0000      1.108
+++ malware-games.ru.po 12 Jan 2021 09:03:12 -0000      1.109
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -429,13 +430,32 @@
 "a>."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Многие популярные мобильные игры 
основаны на системе гач, которая "
 "используется для превращения телефонов в 
игровые автоматы с 2010&nbsp;года. "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- malware-mobiles.de-diff.html        8 Jan 2021 15:04:05 -0000       1.90
+++ malware-mobiles.de-diff.html        12 Jan 2021 09:03:12 -0000      1.91
@@ -198,12 +198,14 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular</em></ins></span> mobile <span 
class="removed"><del><strong>phones,</strong></del></span> <span 
class="inserted"><ins><em>games are based on the
-    gacha system,</em></ins></span> which <span 
class="removed"><del><strong>permits</strong></del></span> <span 
class="inserted"><ins><em>has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular</em></ins></span> mobile <span 
class="removed"><del><strong>phones, which permits converting
+      them</strong></del></span> <span class="inserted"><ins><em>games include 
a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -213,8 +215,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M209900001"&gt;
     &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general universal back
-    door&lt;/a&gt; in essentially all mobile phones, which 
permits</em></ins></span> converting
-    them into full-time listening devices.&lt;/p&gt;
+    door&lt;/a&gt; in essentially all mobile phones, which permits converting
+    them</em></ins></span> into full-time listening devices.&lt;/p&gt;
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
@@ -277,18 +279,18 @@
 
 &lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</strong></del></span> <span class="inserted"><ins><em>make</em></ins></span> 
the <span class="removed"><del><strong>file</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any 
code</em></ins></span>
-    they <span class="removed"><del><strong>do not count as malware. We 
mention them</strong></del></span> <span 
class="inserted"><ins><em>wanted.&lt;/p&gt;
+&lt;p&gt;These bugs are/were not intentional, so unlike</strong></del></span> 
<span class="inserted"><ins><em>make</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any code
+    they wanted.&lt;/p&gt;
 
-    &lt;p&gt;This is a concrete example of what users are 
exposed</em></ins></span> to <span class="removed"><del><strong>refute the
+    &lt;p&gt;This is a concrete example</em></ins></span> of <span 
class="removed"><del><strong>the file</strong></del></span> <span 
class="inserted"><ins><em>what users are exposed to when</em></ins></span> they 
<span class="removed"><del><strong>do not count as malware. We mention them to 
refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</strong></del></span> <span class="inserted"><ins><em>when they
-    run nonfree apps. They</em></ins></span> can <span 
class="inserted"><ins><em>never</em></ins></span> be
+  &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</strong></del></span>
+    <span class="inserted"><ins><em>run nonfree apps. They</em></ins></span> 
can <span class="inserted"><ins><em>never</em></ins></span> be
   <span class="removed"><del><strong>&lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs</strong></del></span> <span class="inserted"><ins><em>completely 
sure</em></ins></span> that <span class="removed"><del><strong>play 
commands</strong></del></span> <span class="inserted"><ins><em>a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
@@ -320,18 +322,18 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models</em></ins></span> of <span class="inserted"><ins><em>mobile 
phones have</em></ins></span> a <span 
class="removed"><del><strong>bug</strong></del></span> <span 
class="inserted"><ins><em>&lt;a href="#universal-back-door-phone-modem"&gt;
-    universal back door</em></ins></span> in
-       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
modem chip&lt;/a&gt;. So why did Coolpad bother
-    to introduce another? Because this one is controlled by 
Coolpad.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    A Chinese version</em></ins></span> of <span 
class="inserted"><ins><em>Android has</em></ins></span> a <span 
class="removed"><del><strong>bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung
-phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;Samsung</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt;. Nearly
+    all models of mobile</em></ins></span> phones <span 
class="inserted"><ins><em>have a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
 <span class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
+    to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
+  &lt;li id="M201403120.1"&gt;
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
     Samsung Galaxy devices running proprietary Android versions come 
with</em></ins></span>
@@ -396,58 +398,58 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201501030"&gt;
-    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix 
Android</em></ins></span> app <span class="removed"><del><strong>listens all 
the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix 
Android</em></ins></span> app <span class="removed"><del><strong>listens all 
the time,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
   on what people are listening to or watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations to serve them with targeted
-  advertisements.&lt;/p&gt;
-&lt;/li&gt;
+  be analyzing people's conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+    forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
+    Netflix uses</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>enforce the geolocation restrictions dictated by the
+    movie studios.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
 
-&lt;li&gt;
-  &lt;p&gt;A</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
       research paper&lt;/a&gt; that investigated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces</em></ins></span> the <span class="removed"><del><strong>privacy 
and security</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>283 Android VPN apps concluded that &ldquo;in 
spite</strong></del></span> <span class="inserted"><ins><em>Google 
DNS&lt;/a&gt;. This is one</em></ins></span> of the
-    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given</strong></del></span> <span class="inserted"><ins><em>methods 
that
-    Netflix uses to enforce the geolocation restrictions 
dictated</em></ins></span> by the
-    <span class="removed"><del><strong>majority of VPN 
apps&mdash;millions</strong></del></span>
-    <span class="inserted"><ins><em>movie studios.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the 
rest</em></ins></span> of <span class="removed"><del><strong>users may be 
unawarely subject</strong></del></span> <span class="inserted"><ins><em>the file
-  they do not count as malware. We mention them</em></ins></span> to <span 
class="removed"><del><strong>poor security guarantees and abusive practices 
inflicted</strong></del></span> <span class="inserted"><ins><em>refute the
+&lt;p&gt;These bugs are/were not intentional, so unlike</em></ins></span> the 
<span class="removed"><del><strong>privacy and security</strong></del></span> 
<span class="inserted"><ins><em>rest</em></ins></span> of <span 
class="removed"><del><strong>283</strong></del></span> <span 
class="inserted"><ins><em>the file
+  they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908020"&gt;
-    &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested</em></ins></span> by
-    <span class="removed"><del><strong>VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following is</strong></del></span> <span 
class="inserted"><ins><em>security researchers, eight &lt;a
+    &lt;p&gt;Out of 21 gratis</em></ins></span> Android <span 
class="removed"><del><strong>VPN</strong></del></span> <span 
class="inserted"><ins><em>antivirus</em></ins></span> apps <span 
class="removed"><del><strong>concluded</strong></del></span>
+    that <span class="removed"><del><strong>&ldquo;in 
spite</strong></del></span> <span class="inserted"><ins><em>were tested by 
security researchers, eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed to detect</em></ins></span> a <span 
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>test virus&lt;/a&gt;. All</em></ins></span> of <span 
class="removed"><del><strong>proprietary VPN apps from</strong></del></span> 
<span class="inserted"><ins><em>them asked for dangerous
+    failed to detect a test virus&lt;/a&gt;. All</em></ins></span> of <span 
class="removed"><del><strong>the
+    promises</strong></del></span> <span class="inserted"><ins><em>them 
asked</em></ins></span> for <span class="removed"><del><strong>privacy, 
security, and anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>dangerous
     permissions or contained advertising trackers, with seven being more
-    risky than</em></ins></span> the <span 
class="removed"><del><strong>research paper</strong></del></span> <span 
class="inserted"><ins><em>average of the 100 most popular Android 
apps.&lt;/p&gt;
+    risky than</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN 
apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>average</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely 
subject</strong></del></span> <span class="inserted"><ins><em>the 100 most 
popular Android apps.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> the 
<span class="removed"><del><strong>privacy of
-    users:&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note that the article refers</em></ins></span> to 
<span class="removed"><del><strong>poor security guarantees and abusive 
practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
 
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</strong></del></span> <span class="inserted"><ins><em>article 
refers</em></ins></span> to <span class="removed"><del><strong>track 
users</strong></del></span> <span class="inserted"><ins><em>these proprietary 
apps as
+  &lt;p&gt;Following is a non-exhaustive list of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>VPN</strong></del></span> apps <span 
class="removed"><del><strong>from
+    the research paper that tracks</strong></del></span> <span 
class="inserted"><ins><em>as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa,</em></ins></span> and <span 
class="removed"><del><strong>show</strong></del></span> <span 
class="inserted"><ins><em>all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa,</em></ins></span> and <span 
class="removed"><del><strong>infringes</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries</strong></del></span> <span 
class="inserted"><ins><em>other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -1151,8 +1153,8 @@
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show</em></ins></span> them targeted 
ads.&lt;/dd&gt;
+      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as NativeX 
and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
@@ -1655,7 +1657,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- malware-mobiles.de.po       8 Jan 2021 15:04:05 -0000       1.146
+++ malware-mobiles.de.po       12 Jan 2021 09:03:13 -0000      1.147
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -350,12 +350,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><h3>

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- malware-mobiles.es.po       9 Jan 2021 10:59:51 -0000       1.207
+++ malware-mobiles.es.po       12 Jan 2021 09:03:13 -0000      1.208
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -261,13 +262,32 @@
 msgstr "Adicciones"
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Muchos populares juegos para móviles están basados en el sistema "
 "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- malware-mobiles.fr.po       8 Jan 2021 16:10:45 -0000       1.221
+++ malware-mobiles.fr.po       12 Jan 2021 09:03:13 -0000      1.222
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-08 17:08+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -258,13 +259,32 @@
 msgstr "Addiction"
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Beaucoup de jeux populaires sur mobiles sont basés sur le système 
<i>gacha</"
 "i>, qui transforme les téléphones en machines à sous depuis 2010. Le "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-mobiles.it-diff.html        8 Jan 2021 15:04:05 -0000       1.95
+++ malware-mobiles.it-diff.html        12 Jan 2021 09:03:13 -0000      1.96
@@ -220,7 +220,7 @@
 &lt;ul&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all</strong></del></span> the <span 
class="removed"><del><strong>other voice-control systems 
can</strong></del></span>
+  &lt;p&gt;Siri, Alexa, and all</strong></del></span> the <span 
class="removed"><del><strong>other voice-control systems</strong></del></span>
     <span class="inserted"><ins><em>back door, but at least it is unable to 
turn the phone unto a
     listening device.&lt;/p&gt;
 
@@ -253,12 +253,13 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -950,7 +951,7 @@
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't</em></ins></span> be <span 
class="inserted"><ins><em>tracked&mdash;pay cash!&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
@@ -990,8 +991,8 @@
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
@@ -999,26 +1000,26 @@
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span 
class="removed"><del><strong>ultrasound</strong></del></span>
-    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public, so we</em></ins></span> can <span 
class="removed"><del><strong>be</strong></del></span> <span 
class="inserted"><ins><em>depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span 
class="removed"><del><strong>humans can't hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>play 
commands in ultrasound</strong></del></span> <span 
class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope</em></ins></span> that 
<span class="removed"><del><strong>humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they 
don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -1657,7 +1658,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- malware-mobiles.it.po       8 Jan 2021 15:04:05 -0000       1.146
+++ malware-mobiles.it.po       12 Jan 2021 09:03:13 -0000      1.147
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -330,12 +330,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><h3>

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-mobiles.ja-diff.html        8 Jan 2021 15:04:05 -0000       1.113
+++ malware-mobiles.ja-diff.html        12 Jan 2021 09:03:13 -0000      1.114
@@ -210,8 +210,8 @@
     <span class="inserted"><ins><em>has the power</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>rewrite the software for the main processor
     too.&lt;/p&gt;
 
-    &lt;p&gt;A few phone models are specially designed so 
that</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>modem
-    processor does not control the microphone,</em></ins></span> and <span 
class="removed"><del><strong>you should</strong></del></span> <span 
class="inserted"><ins><em>so that it can't
+    &lt;p&gt;A few phone models are specially designed so that the modem
+    processor does not control</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>microphone,</em></ins></span> and <span 
class="removed"><del><strong>you should</strong></del></span> <span 
class="inserted"><ins><em>so that it can't
     change the software in the main processor.  They still</em></ins></span> 
have the <span class="removed"><del><strong>right</strong></del></span>
     <span class="inserted"><ins><em>back door, but at least it is 
unable</em></ins></span> to
   <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>turn the phone 
unto a
@@ -230,7 +230,7 @@
     <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;</em></ins></span>
     transmit <span class="removed"><del><strong>personal data in an insecure 
way&lt;/a&gt;.
 However,</strong></del></span> <span class="inserted"><ins><em>even when they 
are turned off&lt;/a&gt;.  This means their movements
-    are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these</strong></del></span> <span 
class="inserted"><ins><em>listening feature work.&lt;/p&gt;
+    are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of</strong></del></span> <span 
class="inserted"><ins><em>listening feature work.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -256,12 +256,13 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1001,7 +1002,7 @@
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and study
+    &lt;p&gt;Google could demand the source code for</em></ins></span> these 
<span class="inserted"><ins><em>apps, and study
     the source code somehow to determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
@@ -1509,7 +1510,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-mobiles.ja.po       8 Jan 2021 15:04:05 -0000       1.137
+++ malware-mobiles.ja.po       12 Jan 2021 09:03:13 -0000      1.138
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -270,12 +270,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><h3>

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-mobiles.pot 8 Jan 2021 15:04:05 -0000       1.112
+++ malware-mobiles.pot 12 Jan 2021 09:03:13 -0000      1.113
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -205,11 +205,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
 
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
 "
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><h3>

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- malware-mobiles.ru.po       10 Jan 2021 08:31:39 -0000      1.255
+++ malware-mobiles.ru.po       12 Jan 2021 09:03:13 -0000      1.256
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -255,13 +256,32 @@
 msgstr "Зависимость"
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Многие популярные мобильные игры 
основаны на системе гач, которая "
 "используется для превращения телефонов в 
игровые автоматы с 2010&nbsp;года. "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- nl.po       11 Jan 2021 09:34:35 -0000      1.267
+++ nl.po       12 Jan 2021 09:03:13 -0000      1.268
@@ -3562,7 +3562,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3596,11 +3596,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015, 2016-] {+2017-2020+} Free Software Foundation,
+# | Copyright &copy; [-2015, 2016-] {+2017-2021+} Free Software Foundation,
 # | Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3836,12 +3836,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4534,6 +4535,14 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015, 2016-] {+2017-2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware in Online Conferencing+} - GNU Project -
 # | Free Software Foundation
@@ -6996,7 +7005,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -7073,9 +7082,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- pl.po       11 Jan 2021 09:34:35 -0000      1.266
+++ pl.po       12 Jan 2021 09:03:13 -0000      1.267
@@ -3135,7 +3135,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3169,11 +3169,11 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015-] {+2017-2020+} Free Software
+# | Copyright &copy; [-2013, 2014, 2015-] {+2017-2021+} Free Software
 # | Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3410,12 +3410,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4058,6 +4059,14 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2017-2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware in Online Conferencing+} - GNU Project -
 # | Free Software Foundation
@@ -6452,7 +6461,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -6529,9 +6538,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- pot 11 Jan 2021 09:34:35 -0000      1.265
+++ pot 12 Jan 2021 09:03:13 -0000      1.266
@@ -2914,7 +2914,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -2948,7 +2948,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <title>
@@ -3180,12 +3180,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -3817,6 +3818,10 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
 msgstr ""
@@ -6135,7 +6140,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -6212,9 +6217,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>

Index: proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary-addictions.es.po        9 Jan 2021 10:59:52 -0000       1.65
+++ proprietary-addictions.es.po        12 Jan 2021 09:03:13 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -114,9 +115,21 @@
 msgstr "Juegos"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# | 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -219,17 +232,22 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "Las «cajas de botín» (<cite>loot boxes</cite>) son una aplicación directa 
"
 "del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
 "seductoras animaciones. Son <a href=\"https://www.pcgamer.com/behind-the-";
 "addictive-psychology-and-seductive-art-of-loot-boxes/\">semejantes a los "
-"juegos de apuestas</a>, al igual que los <a href=\"https://es.wikipedia.org/";
-"wiki/Videojuego_gacha\">juegos <cite>gacha</cite></a>, muy populares en "
-"Asia, que pueden considerarse los precursores de las «cajas de botín»."
+"juegos de apuestas</a>."
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
@@ -590,13 +608,32 @@
 "convertirse en una costosa adicción."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Muchos populares juegos para móviles están basados en el sistema "
 "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "

Index: proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-addictions.fr.po        8 Jan 2021 16:10:45 -0000       1.72
+++ proprietary-addictions.fr.po        12 Jan 2021 09:03:13 -0000      1.73
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-08 17:08+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -109,9 +110,21 @@
 msgstr "Jeux"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# | 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -209,13 +222,28 @@
 msgstr "Il y a des moyens encore plus élaborés de rendre les jeux addictifs."
 
 #. type: Content of: <div><div><ul><li>
+# | &ldquo;Loot boxes&rdquo; are a direct application of the random reward
+# | mechanism, and their addictiveness is enhanced by seductive animation.
+# | They are <a
+# | 
href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\";>
+# | akin to [-gambling</a>, and so are the <a
+# | href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very
+# | popular in Asia, which may be considered the ancestors of loot boxes.-]
+# | {+gambling</a>.+}
+#, fuzzy
+#| msgid ""
+#| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
+#| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
+#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#| "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</"
+#| "a>, very popular in Asia, which may be considered the ancestors of loot "
+#| "boxes."
 msgid ""
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "Les « boîtes à butin » sont une application directe du mécanisme de "
 "récompense aléatoire. De plus leur pouvoir addictif est amplifié par des "
@@ -227,6 +255,15 @@
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -580,13 +617,32 @@
 "en obtenir plus, ce qui peut devenir coûteux à la longue."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Beaucoup de jeux populaires sur mobiles sont basés sur le système 
<i>gacha</"
 "i>, qui transforme les téléphones en machines à sous depuis 2010. Le "

Index: proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary-addictions.pot  8 Jan 2021 15:04:06 -0000       1.35
+++ proprietary-addictions.pot  12 Jan 2021 09:03:13 -0000      1.36
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -95,7 +95,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a "
+"spending money on the game. To achieve this result, developers use <a "
 
"href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
 "
 "techniques that derive from behavioral and brain research</a>:"
 msgstr ""
@@ -172,9 +172,16 @@
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a "
 
"href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\";>
 "
-"akin to gambling</a>, and so are the <a "
-"href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular "
-"in Asia, which may be considered the ancestors of loot boxes."
+"akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>
@@ -407,11 +414,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
 
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
 "
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary-addictions.ru.po        10 Jan 2021 08:31:39 -0000      1.64
+++ proprietary-addictions.ru.po        12 Jan 2021 09:03:13 -0000      1.65
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -111,9 +112,21 @@
 msgstr "Игры"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# | 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -214,16 +227,21 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "&ldquo;Лутбоксы&rdquo; представляют прямое 
приложение механизма случайного "
 "вознаграждения, а зависимость от них 
повышается посредством соблазнительной "
 "мультипликации. Это <a 
href=\"https://www.pcgamer.com/behind-the-addictive-";
-"psychology-and-seductive-art-of-loot-boxes/\"> сродни азартным 
играм</a>, "
-"также как <a 
href=\"https://wikipedia.org/wiki/Gacha_game\";>гача-игры</a>, "
-"очень популярные в Азии, которых можно 
считать предшественниками лутбоксов."
+"psychology-and-seductive-art-of-loot-boxes/\"> сродни азартным 
играм</a>."
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
@@ -575,13 +593,32 @@
 "превратиться в дорогостоящую привычку."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Многие популярные мобильные игры 
основаны на системе гач, которая "
 "используется для превращения телефонов в 
игровые автоматы с 2010&nbsp;года. "

Index: proprietary-addictions.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-addictions.tr.po        8 Jan 2021 15:04:06 -0000       1.30
+++ proprietary-addictions.tr.po        12 Jan 2021 09:03:13 -0000      1.31
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-10-29 17:46+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -108,9 +108,16 @@
 msgstr "Oyunlar"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -208,19 +215,11 @@
 "yolları da vardır."
 
 #. type: Content of: <div><div><ul><li>
-#, fuzzy
-#| msgid ""
-#| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
-#| "mechanism, and their addictiveness is enhanced by seductive animation. "
-#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
-#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgid ""
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "&ldquo;Yağma sandıkları&rdquo;, rastgele ödül mekanizmasının doğrudan 
bir "
 "uygulamasıdır ve bağımlılık yapıcılıkları baştan çıkarıcı 
animasyon ile "
@@ -230,6 +229,15 @@
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -582,12 +590,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-surveillance.de-diff.html       11 Jan 2021 09:34:35 -0000      
1.155
+++ proprietary-surveillance.de-diff.html       12 Jan 2021 09:03:13 -0000      
1.156
@@ -1479,8 +1479,8 @@
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or <span 
class="removed"><del><strong>Android
-    users,</strong></del></span> <span class="inserted"><ins><em>Android users,
+    <span class="removed"><del><strong>cheating?  There is no systematic way 
for Google,</strong></del></span>
+    <span class="inserted"><ins><em>cheating? There is no systematic way for 
Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
@@ -1508,7 +1508,8 @@
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    to ultrasound from beacons placed in stores</em></ins></span> or <span 
class="removed"><del><strong>Android
+    users,</strong></del></span> <span class="inserted"><ins><em>played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1533,10 +1534,9 @@
     &lt;p&gt;The suit accuses that this was done without the users' 
consent.</em></ins></span>
     If <span class="removed"><del><strong>it did a good 
job</strong></del></span> <span class="inserted"><ins><em>the fine 
print</em></ins></span> of <span class="inserted"><ins><em>the app said that 
users gave consent for</em></ins></span> this,
     <span class="inserted"><ins><em>would that make</em></ins></span> it <span 
class="removed"><del><strong>could more or less
-    prevent such snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to 
design</em></ins></span>
-    the app <span class="removed"><del><strong>developers are clever
-    enough</strong></del></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
+    prevent such snooping, except</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
@@ -1550,16 +1550,18 @@
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot 
trust</strong></del></span> <span class="inserted"><ins><em>same information
-    about the users' searches that</em></ins></span> Google <span 
class="removed"><del><strong>to protect us. We</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets</em></ins></span> when 
<span class="inserted"><ins><em>they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the 
user</em></ins></span> must <span class="removed"><del><strong>demand 
release</strong></del></span>
-    <span class="inserted"><ins><em>explicitly opt-in before the app takes 
effect. However, the app
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    explicitly opt-in before</em></ins></span> the app <span 
class="removed"><del><strong>developers are clever
+    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>takes effect. However,</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release</strong></del></span> <span 
class="inserted"><ins><em>app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
@@ -1625,10 +1627,11 @@
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5 tracking libraries. Developers of this app 
have
-      confirmed that the non-premium version of the app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
+      <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking <span class="inserted"><ins><em>the user</em></ins></span> and 
<span class="removed"><del><strong>display</strong></del></span> <span 
class="inserted"><ins><em>displaying</em></ins></span> ads.&lt;/dd&gt;
+  <span class="removed"><del><strong>&lt;/dl&gt;
 &lt;/li&gt;
 &lt;li&gt;
   &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
@@ -1660,32 +1663,29 @@
 
 &lt;li&gt;
   &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
-      <span class="inserted"><ins><em>five tracking libraries. Developers of 
this</em></ins></span> app <span class="removed"><del><strong>developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>have confirmed that</em></ins></span>
-      the <span class="removed"><del><strong>personal 
details</strong></del></span> <span class="inserted"><ins><em>non-premium 
version</em></ins></span> of <span class="removed"><del><strong>users that 
install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
-      tracking</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>user and displaying 
ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+       data to servers.</strong></del></span>
+    <span class="inserted"><ins><em>&lt;/dl&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to 
who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
+    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
     <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
@@ -1712,15 +1712,15 @@
     even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
     disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
     yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;
+    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them</em></ins></span> 
with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
+    it may</em></ins></span> be <span class="removed"><del><strong>almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>analyzing people's conversations to serve them with 
targeted
     advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
@@ -1757,11 +1757,11 @@
     &lt;p&gt;The article takes for granted that the usual analytics tools are
     legitimate, but is that valid? Software developers have no right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+    that <span class="removed"><del><strong>snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snoop are just as wrong as any other 
snooping.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+  &lt;li id="M201510300"&gt;
     &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
@@ -1796,10 +1796,11 @@
     &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201505060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
@@ -1921,32 +1922,34 @@
     &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
       deactivate iCloud&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>user's computer,</em></ins></span> but <span 
class="removed"><del><strong>it's active by default so</strong></del></span> it 
<span class="removed"><del><strong>still counts as a</strong></del></span> 
<span class="inserted"><ins><em>does</em></ins></span> surveillance <span 
class="removed"><del><strong>functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>too:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries</em></ins></span> to get <span class="removed"><del><strong>at 
them, but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>the user's list</em></ins></span> of <span 
class="removed"><del><strong>them through</strong></del></span> <span 
class="inserted"><ins><em>other people's phone
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get the user's list</em></ins></span> of <span 
class="inserted"><ins><em>other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
+    &lt;p&gt;The FTC criticized</em></ins></span> this <span 
class="inserted"><ins><em>app because it asked the user</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span>
+    <span class="inserted"><ins><em>approve sending personal 
data</em></ins></span> to <span class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>the app 
developer but did not ask
+    about sending it</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>&lt;a class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>user to
-    approve sending personal data to</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get</strong></del></span> <span class="inserted"><ins><em>app 
developer but did not ask
-    about sending it to</em></ins></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>weakness 
of</em></ins></span>
+    the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There is also</strong></del></span> <span 
class="inserted"><ins><em>companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+  &lt;li&gt;&lt;p&gt;There is also</strong></del></span> <span 
class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
     surveillance: why should</em></ins></span> a <span 
class="removed"><del><strong>feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>flashlight app send any information</em></ins></span> 
to <span class="removed"><del><strong>track users, which is
       &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
       enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
@@ -2101,34 +2104,24 @@
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
     &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>lot</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
+      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>lot of money. 
They also
+    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span> <span class="inserted"><ins><em>money. 
They also
-    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an</strong></del></span> article <span 
class="removed"><del><strong>blocked from us by a paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>describes 
gratis games, games</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI</strong></del></span> <span class="inserted"><ins><em>cost 
money</em></ins></span>
-    can <span class="removed"><del><strong>remotely 
activate</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>same 
tactics.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> <span class="inserted"><ins><em>companies, 
and</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -2136,60 +2129,65 @@
     More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on
-      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>every process running on a gamer's 
computer</em></ins></span> and <span class="removed"><del><strong>users cannot 
stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to</strong></del></span> <span class="inserted"><ins><em>sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities 
which</em></ins></span>
-    have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202101050"&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed</em></ins></span> to <span class="removed"><del><strong>restrict
-      the use</strong></del></span> <span class="inserted"><ins><em>snoop on 
users&lt;/a&gt; even if they meet
+    designed to snoop</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>users&lt;/a&gt; 
even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>the program running</em></ins></span> on <span 
class="inserted"><ins><em>some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
-    the <span class="removed"><del><strong>user's computer, but it does 
surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>user 
susceptible to be snooped and exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    design of the program running on some of these devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    the user susceptible</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be snooped and exploited by crackers as
+    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2221,115 +2219,113 @@
   &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
-    every <span class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;
+    every <span 
class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>second of what the user is watching&lt;/a&gt;. 
This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Sarahah app 
-      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>second of 
what</em></ins></span> the <span class="removed"><del><strong>words
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO,</em></ins></span> and <span class="removed"><del><strong>email 
addresses&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
data is sold to third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>user's address
+      book</strong></del></span> <span class="inserted"><ins><em>return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
+
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note 
that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>user is 
watching&lt;/a&gt;. This is illegal due</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+      referring</strong></del></span> <span class="inserted"><ins><em>spying 
acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span>
-    the <span class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>Video Privacy 
Protection Act of 1988, but they're circumventing</em></ins></span>
-    it <span class="removed"><del><strong>may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>through EULAs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>him,
+    is that it is opt-in in newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
+    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is to get your own router (which 
can</em></ins></span>
+    be <span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>an old 
computer running completely free software), and set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>serve 
them</strong></del></span> <span class="inserted"><ins><em>block connections to 
Vizio's servers. Or, as a last resort,
+    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
                &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal 
data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
the <span class="removed"><del><strong>device&lt;/a&gt;.
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
                &lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>own words</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
-   information about</strong></del></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
+        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness</em></ins></span> of <span class="removed"><del><strong>its 
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to 
Netflix.</em></ins></span> The <span 
class="inserted"><ins><em>Netflix</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon the same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is</em></ins></span> that <span class="removed"><del><strong>Google 
normally gets when
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>it is opt-in in newer models. But 
since</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>Vizio software</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>scenes,
-    and there is no guarantee that all future updates will 
leave</em></ins></span> the <span class="removed"><del><strong>app takes 
effect. However,</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter),</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>easiest way to make sure it isn't spying on 
you</em></ins></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+   &lt;p&gt;Currently, the app</strong></del></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span> 
and
+    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>image is coming 
from</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
+    the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The Meitu photo-editing
   app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    to <span class="inserted"><ins><em>disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  user data to</strong></del></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>terrestrial 
antenna
-    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>only</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
-    if you are technically oriented, is to get your own router 
(which</em></ins></span> can <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in the phone,</strong></del></span>
-    <span class="inserted"><ins><em>be an old computer running completely free 
software),</em></ins></span> and <span class="removed"><del><strong>in server 
accounts, it</strong></del></span> <span class="inserted"><ins><em>set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you</em></ins></span> can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>way to disable</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server 
accounts,</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if</em></ins></span> it 
<span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
         movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>article</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the facts it presents. It</em></ins></span>
-    is <span class="removed"><del><strong>inadequate as a protection against 
massive
-        surveillance.&lt;/p&gt;
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>were not hidden</em></ins></span> as <span 
class="removed"><del><strong>a protection against massive</strong></del></span> 
<span class="inserted"><ins><em>it was in these TVs,
+    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span> <span 
class="inserted"><ins><em>too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="inserted"><ins><em>them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports</em></ins></span> what <span 
class="removed"><del><strong>radio</strong></del></span> <span 
class="inserted"><ins><em>it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
 
-  &lt;li id="M201511130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
       are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
     sounds to be picked up by proprietary malware running</em></ins></span>
@@ -2379,14 +2375,13 @@
       &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
     what people</em></ins></span> are <span 
class="removed"><del><strong>private
-      anymore,</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it 
isn't a TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>it isn't 
a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
 
-  &lt;li id="M201505290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
@@ -2447,11 +2442,11 @@
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile 
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps</strong></del></span> <span class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed 
to</em></ins></span> report <span class="removed"><del><strong>which other
-    apps</strong></del></span> <span class="inserted"><ins><em>what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2638,12 +2633,12 @@
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+    conversations was unacceptable <span class="removed"><del><strong>by 
itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareOnSmartWatches --&gt;
@@ -2658,110 +2653,66 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>watch is designed
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
       &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>i-Que</em></ins></span> transmit
-       <span class="removed"><del><strong>conversations 
too&lt;/a&gt;.&lt;/p&gt;
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
-    company based</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>the U.S.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span> <span class="inserted"><ins><em>by itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>back door, but that could 
be</strong></del></span> <span class="inserted"><ins><em>speech recognition
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with</em></ins></span> a <span 
class="removed"><del><strong>back door, but that could be</strong></del></span> 
<span class="inserted"><ins><em>mobile phone. This would enable
-    crackers to listen in on</em></ins></span> a
+    can remotely control the toys with</em></ins></span> a
       <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
+      least.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>mobile phone. This would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
-
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202009270"&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202008030"&gt;
-    &lt;p&gt;Google Nest &lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
-    is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door &lt;a
-    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
-    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm is happening. This means the devices now listen for more
-    than just their wake words. Google says the software update was sent
-    out prematurely</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
on <span class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>accident and Google 
was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>child's 
speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M202006300"&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="inserted"><ins><em>bosses &lt;a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span class="removed"><del><strong>specific sabotage 
method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span>
-    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
-
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is not <span 
class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>an adequate basis for protecting digital 
privacy.  The boss can coerce
-    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2775,99 +2726,134 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>almost anything, even probable exposure
-    to contagious disease that</em></ins></span> can <span 
class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.  
Software like</em></ins></span> this <span class="removed"><del><strong>way, 
because they pass</strong></del></span> <span class="inserted"><ins><em>should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>the household
-    through connected surveillance devices.&lt;/p&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant surveillance</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can 
communicate</strong></del></span> <span class="inserted"><ins><em>the devices 
implemented proper
-    security, including encryption. But many devices</em></ins></span> with 
<span class="removed"><del><strong>it,</strong></del></span> <span 
class="inserted"><ins><em>proprietary
-    software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009270"&gt;
+    &lt;p&gt;Many employers are using nonfree
+    software, including videoconference software, to &lt;a
+    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that</em></ins></span> is <span 
class="inserted"><ins><em>in effect</em></ins></span> a <span 
class="inserted"><ins><em>malicious</em></ins></span>
+    surveillance <span 
class="removed"><del><strong>device.</strong></del></span> <span 
class="inserted"><ins><em>feature.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201907210"&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
-    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it</em></ins></span> is <span class="inserted"><ins><em>not supposed 
to listen&lt;/a&gt;. Thus, when one of Google's
-    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>surveillance device. &lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
-    users were easily identified from these recordings.&lt;/p&gt;
+  &lt;li id="M202008030"&gt;
+    &lt;p&gt;Google Nest</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
+    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out a software
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
+    that</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the 
<span class="removed"><del><strong>manufacturer, based on</strong></del></span> 
<span class="inserted"><ins><em>devices now listen for more
+    than just their wake words. Google says</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="inserted"><ins><em>bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span>
+    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>no
-    way to see or control what it records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
-    get commands</em></ins></span> that the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
+    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that the device gives the company
-      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send to some Google 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>almost 
anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201911190"&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than</em></ins></span> is <span class="removed"><del><strong>&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>&lt;a
       href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends</em></ins></span>
-    it <span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span class="inserted"><ins><em>to Amazon's 
servers, which store it indefinitely. Even
-    worse, Amazon forwards</em></ins></span> it to <span 
class="removed"><del><strong>outsmart
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>no
+    way to see or control what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>use of recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2879,24 +2865,21 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and</strong></del></span> <span class="inserted"><ins><em>third-party 
companies. Thus,
-    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, 
where</em></ins></span> they <span class="removed"><del><strong>report even 
which page</strong></del></span> <span class="inserted"><ins><em>can be 
accessed by
-    advertising companies and government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that</em></ins></span> the user <span 
class="removed"><del><strong>reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;
+      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2908,23 +2891,33 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
   &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf has a built-in cell 
phone modem which allows
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span class="inserted"><ins><em>collecting it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>make changes in various
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>servers
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+    even if <span class="removed"><del><strong>it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
     the devices are tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
     access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
@@ -3279,7 +3272,7 @@
     data remotely</em></ins></span> and <span 
class="removed"><del><strong>would then have to
       give</strong></del></span> <span class="inserted"><ins><em>determine the 
car's location
     at any time. (See Section 2, paragraphs b and c of the &lt;a
-    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
     information, but if the state orders</em></ins></span> it to <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
       &lt;p&gt;Speech recognition is not to be trusted 
unless</strong></del></span> <span class="inserted"><ins><em>data and 
hand</em></ins></span> it <span class="removed"><del><strong>is done
@@ -3918,7 +3911,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- proprietary-surveillance.de.po      11 Jan 2021 09:34:35 -0000      1.368
+++ proprietary-surveillance.de.po      12 Jan 2021 09:03:13 -0000      1.369
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5162,7 +5162,7 @@
 # | car's location at any time. (See [-<a
 # | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
 # | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
+# | 
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 # | privacy statement</a>.)+} The company says it doesn't store this
 # | information, but if the state orders it to get the data and hand it over,
 # | the state can store it.
@@ -5177,7 +5177,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-surveillance.es.po      11 Jan 2021 09:34:35 -0000      1.133
+++ proprietary-surveillance.es.po      12 Jan 2021 09:03:13 -0000      1.134
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-06 13:11+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -4684,10 +4684,25 @@
 "del móvil."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.587
retrieving revision 1.588
diff -u -b -r1.587 -r1.588
--- proprietary-surveillance.fr.po      11 Jan 2021 12:25:24 -0000      1.587
+++ proprietary-surveillance.fr.po      12 Jan 2021 09:03:15 -0000      1.588
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-11 13:22+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -4692,10 +4693,25 @@
 "physiquement."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-surveillance.it-diff.html       11 Jan 2021 09:34:35 -0000      
1.221
+++ proprietary-surveillance.it-diff.html       12 Jan 2021 09:03:15 -0000      
1.222
@@ -2784,9 +2784,8 @@
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest 
thermostat,</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2797,7 +2796,8 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ 
garage opener</em></ins></span> and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
     speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2900,36 +2900,36 @@
 
   &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
     do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+      determine the car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information,</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers 
too,</em></ins></span> but <span class="removed"><del><strong>if the state 
orders it</strong></del></span> <span class="inserted"><ins><em>please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>get the</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
     offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    sending usage</em></ins></span> data
+      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span class="inserted"><ins><em>back 
over</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201706204"&gt;
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>everyone in the 
house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially 
spying</em></ins></span>
+    a device that can obey your voice commands without potentially 
spying</em></ins></span>
     on <span class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
@@ -3016,7 +3016,7 @@
 
     &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>and from the watch, possibly 
endangering</em></ins></span> the <span class="removed"><del><strong>user 
watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>and from</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch, possibly endangering the child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -3146,14 +3146,14 @@
 
     &lt;p&gt;GM did not get users' consent, but it could have 
got</em></ins></span> that <span class="inserted"><ins><em>easily by
     sneaking it into</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for some digital service
+      <span class="removed"><del><strong>transmission reports a 404 
error</strong></del></span> <span class="inserted"><ins><em>contract that users 
sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
     &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want to be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>server
+    &lt;p&gt;But if you</em></ins></span> really <span 
class="removed"><del><strong>means nothing;</strong></del></span> <span 
class="inserted"><ins><em>want to be safe, we must make sure</em></ins></span> 
the <span class="removed"><del><strong>server
       could save</strong></del></span> <span class="inserted"><ins><em>car's
     hardware cannot collect any of that data, or</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
 
@@ -3220,21 +3220,20 @@
     enables</em></ins></span> the <span class="removed"><del><strong>app said 
that users gave consent for this,
 would that make it acceptable? No way! It should be flat out
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>phone company to 
track the car's movements all the time;
-    it is possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>phone 
company</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
+    it is possible</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>physically 
remove the cell phone modem, though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>extract
-    data remotely and determine the car's location</em></ins></span>
-    at <span class="removed"><del><strong>all&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>any time. (See Section 2, paragraphs 
b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
-    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      video game consoles snoop on their users</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company to extract
+    data remotely</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>determine the car's location
+    at any time. (See Section 2, paragraphs b and c of the &lt;a
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
     information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
@@ -3747,7 +3746,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary-surveillance.it.po      11 Jan 2021 09:34:35 -0000      1.380
+++ proprietary-surveillance.it.po      12 Jan 2021 09:03:15 -0000      1.381
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4837,7 +4837,7 @@
 # | car's location at any time. (See [-<a
 # | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
 # | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# | 
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
+# | 
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 # | privacy statement</a>.)+} The company says it doesn't store this
 # | information, but if the state orders it to get the data and hand it over,
 # | the state can store it.
@@ -4852,7 +4852,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary-surveillance.ja-diff.html       11 Jan 2021 09:34:35 -0000      
1.239
+++ proprietary-surveillance.ja-diff.html       12 Jan 2021 09:03:15 -0000      
1.240
@@ -1490,59 +1490,57 @@
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
       Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
       store this information,</strong></del></span> <span 
class="inserted"><ins><em>nasty thing,</em></ins></span> but <span 
class="removed"><del><strong>if the state orders it to get the data
-      and hand</strong></del></span> <span class="inserted"><ins><em>cannot 
make</em></ins></span> it <span class="removed"><del><strong>over, the state 
can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
+      and hand it over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>cannot</em></ins></span> make <span 
class="removed"><del><strong>sure to place new items on top under each 
subsection --&gt;
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202003260"&gt;
-    &lt;p&gt;The Apple iOS version of Zoom &lt;a
-    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users' data</em></ins></span> to <span 
class="removed"><del><strong>spy on their renters&lt;/a&gt;.&lt;/p&gt;
+      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it less nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if the user doesn't 
have</em></ins></span>
-    a <span class="removed"><del><strong>woman came up</strong></del></span> 
<span class="inserted"><ins><em>Facebook account. According</em></ins></span> 
to <span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>the article, Zoom</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span>
-    don't <span class="removed"><del><strong>know. You can't see out the other 
way.&rdquo; Evidently that was
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>even mention this 
surveillance</em></ins></span> on their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't 
expect</strong></del></span> <span class="inserted"><ins><em>privacy policy 
page,
-    making</em></ins></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202003260"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>report was 
as</strong></del></span> <span class="inserted"><ins><em>Apple iOS 
version</em></ins></span> of <span class="removed"><del><strong>2014, but we 
don't expect this has got better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
+    &lt;p&gt;This shows that laws requiring products to 
get</strong></del></span> <span class="inserted"><ins><em>Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending</em></ins></span> users' <span class="removed"><del><strong>formal
+      consent before collecting personal</strong></del></span> data <span 
class="removed"><del><strong>are totally inadequate.
+      And what happens</strong></del></span> <span 
class="inserted"><ins><em>to Facebook&lt;/a&gt; even</em></ins></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user doesn't have
+    a Facebook account. According</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>an obvious violation 
of people's privacy even in their
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>article, Zoom and 
Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1574,68 +1572,53 @@
     reason</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>use free software instead.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Note:</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article uses the word &ldquo;free&rdquo; in
-    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+      is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households 
to</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;free&rdquo; in
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+  &lt;li id="M201912090"&gt;
     &lt;p&gt;iMonsters and Android phones,
     when used for work, give employers powerful &lt;a
     
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand</em></ins></span> to <span 
class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span>
-    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
     and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910130"&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span> <span class="inserted"><ins><em>Great Nation&rdquo; 
app requires</em></ins></span> users to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>grant it &lt;a
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>TV 
advertisements play inaudible sounds</strong></del></span>
-    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>contain a
-    back-door allowing developers</em></ins></span> to <span 
class="removed"><del><strong>determine that</strong></del></span> <span 
class="inserted"><ins><em>run any code</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and
-      <span class="removed"><del><strong>other</strong></del></span> <span 
class="inserted"><ins><em>using this
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs 
recognize</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
     readable after copy-pasting in a text editor) includes a clarification
     saying that the tests were only performed on the Android version
-    of the app,</em></ins></span> and <span class="inserted"><ins><em>that, 
according to Apple, &ldquo;this kind of
+    of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> it <span 
class="removed"><del><strong>isn't a TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>is 
turned off&lt;/a&gt;, after tricking them
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
     into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>listening 
all</strong></del></span> <span class="inserted"><ins><em>Maya &lt;a
+  &lt;li id="M201909090"&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
     send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2502,8 +2485,10 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
-    already monitors. Tivo customers are unaware they're
+    to the 600 millions social media</em></ins></span> profiles the company 
<span class="removed"><del><strong>already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing</strong></del></span>
+    <span class="inserted"><ins><em>already monitors. Tivo customers are 
unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
@@ -3082,7 +3067,7 @@
     &lt;p&gt;Tesla cars allow the company to extract
     data remotely and determine the car's location
     at any time. (See Section 2, paragraphs b and c of the &lt;a
-    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
     information, but if the state orders it to get the data and hand it
     over, the state can store it.&lt;/p&gt;
@@ -3091,13 +3076,14 @@
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
+    records</em></ins></span> information <span 
class="inserted"><ins><em>about drivers' movements&lt;/a&gt;, which is made
     available to car manufacturers, insurance companies, and others.&lt;/p&gt;
 
     &lt;p&gt;The case of toll-collection systems, mentioned in this article,
     is not really a matter of proprietary surveillance. These systems
-    are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but the invasion isn't done by malware. The
+    are an intolerable invasion of privacy, and should be 
replaced</em></ins></span> with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>anonymous payment systems, but the 
invasion isn't done by malware. The
     other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3110,8 +3096,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
-    &lt;p&gt;Oculus headsets &lt;a
-    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
@@ -3126,7 +3113,7 @@
 
     &lt;p&gt;You can bet Facebook will implement the maximum possible
     surveillance on Oculus Rift devices. The moral is, never trust a VR
-    system with nonfree software in it.&lt;/p&gt;
+    system</em></ins></span> with <span class="removed"><del><strong>online 
purchases&lt;/a&gt;, exposing</strong></del></span> <span 
class="inserted"><ins><em>nonfree software in it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3142,50 +3129,60 @@
    programs, so it
    &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
    makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance is an abuse all the same.&lt;/p&gt;
+   but the surveillance is an abuse</em></ins></span> all <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>the same.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible to disable an
+    longer possible</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>disable an
     unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
     
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
-    going to be based on Chromium.&lt;/p&gt;
+    Opera, Microsoft Edge</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>also in the 
upcoming Microsoft Edge that is
+    going</em></ins></span> to be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running</strong></del></span> <span 
class="inserted"><ins><em>based</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span 
class="inserted"><ins><em>Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901101"&gt;
     &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    sent the precise GPS location</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>Twitter's server&lt;/a&gt;. It still
     contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    on the reporters</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>use 
it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701060"&gt;
     &lt;p&gt;When a page uses Disqus
-    for comments, the proprietary Disqus software &lt;a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    for comments, the proprietary Disqus software</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
     a Facebook software package into the browser of every anonymous visitor
-    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  &lt;li id="M201612064"&gt;
-    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
-    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses to show different people different prices&lt;/a&gt;. Most of
+  <span class="inserted"><ins><em>&lt;li id="M201612064"&gt;
+    &lt;p&gt;Online sales, with tracking</em></ins></span> and <span 
class="inserted"><ins><em>surveillance of customers,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different</em></ins></span> people <span 
class="removed"><del><strong>are watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>different prices&lt;/a&gt;. Most of
     the tracking is done by recording interactions with servers, but
-    proprietary software contributes.&lt;/p&gt;
+    proprietary software contributes.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201405140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
     Microsoft SkyDrive allows the NSA to directly examine users'
@@ -3194,14 +3191,15 @@
 
   &lt;li id="M201210240"&gt;
     &lt;p&gt;Many web sites rat their visitors to advertising
-    networks that track users.  Of the top 1000 web sites, &lt;a
-    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    networks that track users.  Of the top 1000 web sites,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
     (as of 5/17/2012) fed their visitors third-party cookies, allowing
     other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201208210"&gt;
-    &lt;p&gt;Many web sites report all their visitors
+    &lt;p&gt;Many web sites report</em></ins></span> all <span 
class="inserted"><ins><em>their visitors
     to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
     tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
@@ -3635,7 +3633,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- proprietary-surveillance.ja.po      11 Jan 2021 09:34:35 -0000      1.362
+++ proprietary-surveillance.ja.po      12 Jan 2021 09:03:15 -0000      1.363
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3863,7 +3863,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary-surveillance.pot        11 Jan 2021 09:34:35 -0000      1.301
+++ proprietary-surveillance.pot        12 Jan 2021 09:03:15 -0000      1.302
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3150,7 +3150,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 "
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>
 "
 "privacy statement</a>.) The company says it doesn't store this information, "
 "but if the state orders it to get the data and hand it over, the state can "
 "store it."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.671
retrieving revision 1.672
diff -u -b -r1.671 -r1.672
--- proprietary-surveillance.ru.po      11 Jan 2021 14:31:40 -0000      1.671
+++ proprietary-surveillance.ru.po      12 Jan 2021 09:03:15 -0000      1.672
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -4641,10 +4642,25 @@
 "автомобиля; хотя можно физически удалить 
модем сотовой связи."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary.de-diff.html    11 Jan 2021 09:34:35 -0000      1.216
+++ proprietary.de-diff.html    12 Jan 2021 09:03:15 -0000      1.217
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -225,12 +225,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101050"&gt;
@@ -332,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.de.po   11 Jan 2021 09:34:35 -0000      1.254
+++ proprietary.de.po   12 Jan 2021 09:03:16 -0000      1.255
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -481,12 +481,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- proprietary.es.po   11 Jan 2021 09:34:35 -0000      1.383
+++ proprietary.es.po   12 Jan 2021 09:03:16 -0000      1.384
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -348,13 +348,32 @@
 "libertad computacional del usuario."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Muchos populares juegos para móviles están basados en el sistema "
 "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.429
retrieving revision 1.430
diff -u -b -r1.429 -r1.430
--- proprietary.fr.po   11 Jan 2021 12:25:24 -0000      1.429
+++ proprietary.fr.po   12 Jan 2021 09:03:16 -0000      1.430
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-11 13:22+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -339,13 +340,32 @@
 "libertés numériques de l'utilisateur."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Beaucoup de jeux populaires sur mobiles sont basés sur le système 
<i>gacha</"
 "i>, qui transforme les téléphones en machines à sous depuis 2010. Le "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary.it-diff.html    11 Jan 2021 09:34:36 -0000      1.228
+++ proprietary.it-diff.html    12 Jan 2021 09:03:16 -0000      1.229
@@ -27,8 +27,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -224,12 +224,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101050"&gt;
@@ -331,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.it.po   11 Jan 2021 09:34:36 -0000      1.263
+++ proprietary.it.po   12 Jan 2021 09:03:16 -0000      1.264
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,12 +486,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary.ja-diff.html    11 Jan 2021 09:34:36 -0000      1.233
+++ proprietary.ja-diff.html    12 Jan 2021 09:03:16 -0000      1.234
@@ -62,8 +62,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -148,8 +148,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -164,8 +164,8 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -223,12 +223,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101050"&gt;
@@ -330,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary.ja.po   11 Jan 2021 09:34:36 -0000      1.247
+++ proprietary.ja.po   12 Jan 2021 09:03:16 -0000      1.248
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -344,12 +344,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.nl-diff.html    11 Jan 2021 09:34:36 -0000      1.229
+++ proprietary.nl-diff.html    12 Jan 2021 09:03:16 -0000      1.230
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -224,12 +224,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101050"&gt;
@@ -331,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary.nl.po   11 Jan 2021 09:34:36 -0000      1.237
+++ proprietary.nl.po   12 Jan 2021 09:03:16 -0000      1.238
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -389,12 +389,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary.pl-diff.html    11 Jan 2021 09:34:36 -0000      1.246
+++ proprietary.pl-diff.html    12 Jan 2021 09:03:16 -0000      1.247
@@ -154,19 +154,19 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -187,10 +187,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -223,12 +223,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101050"&gt;
@@ -330,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.pl.po   11 Jan 2021 09:34:36 -0000      1.230
+++ proprietary.pl.po   12 Jan 2021 09:03:16 -0000      1.231
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -570,12 +570,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary.pot     11 Jan 2021 09:34:36 -0000      1.227
+++ proprietary.pot     12 Jan 2021 09:03:16 -0000      1.228
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -279,11 +279,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
 
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
 "
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary.pt-br.po        11 Jan 2021 09:34:36 -0000      1.377
+++ proprietary.pt-br.po        12 Jan 2021 09:03:16 -0000      1.378
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-05 16:36-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -342,12 +342,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.455
retrieving revision 1.456
diff -u -b -r1.455 -r1.456
--- proprietary.ru.po   11 Jan 2021 14:31:40 -0000      1.455
+++ proprietary.ru.po   12 Jan 2021 09:03:16 -0000      1.456
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -342,13 +343,32 @@
 "ваши данные."
 
 #. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Многие популярные мобильные игры 
основаны на системе гач, которая "
 "используется для превращения телефонов в 
игровые автоматы с 2010&nbsp;года. "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.tr.po   11 Jan 2021 09:34:36 -0000      1.105
+++ proprietary.tr.po   12 Jan 2021 09:03:16 -0000      1.106
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-12-17 18:19+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -345,12 +345,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.zh-cn.po        11 Jan 2021 09:34:36 -0000      1.134
+++ proprietary.zh-cn.po        12 Jan 2021 09:03:16 -0000      1.135
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2021-01-08 13:41+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -319,12 +319,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- proprietary.zh-tw-diff.html 11 Jan 2021 09:34:36 -0000      1.209
+++ proprietary.zh-tw-diff.html 12 Jan 2021 09:03:16 -0000      1.210
@@ -57,17 +57,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -225,12 +225,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201604040"&gt;
-    &lt;p&gt;Many popular mobile games are based on the
-    gacha system, which has been turning phones into
-    slot machines ever since 2010. The &ldquo;complete
-    gacha&rdquo; variant was declared illegal in Japan in 2012, but &lt;a
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    the legal variants are still exploiting users&lt;/a&gt;.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101050"&gt;
@@ -332,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary.zh-tw.po        11 Jan 2021 09:34:36 -0000      1.217
+++ proprietary.zh-tw.po        12 Jan 2021 09:03:16 -0000      1.218
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -459,12 +459,13 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- pt-br.po    11 Jan 2021 09:34:36 -0000      1.336
+++ pt-br.po    12 Jan 2021 09:03:16 -0000      1.337
@@ -3586,7 +3586,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3621,13 +3621,9 @@
 
 #. type: Content of: <div><p>
 #, fuzzy
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
+#| msgid "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2016-2019 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
 #, fuzzy
@@ -3968,12 +3964,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4737,6 +4734,16 @@
 "quebrar a restrição). Felizmente, a maioria dos dispositivos Android não 
são "
 "tiranos."
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -7580,9 +7587,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -7687,9 +7701,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.565
retrieving revision 1.566
diff -u -b -r1.565 -r1.566
--- ru.po       11 Jan 2021 15:02:50 -0000      1.565
+++ ru.po       12 Jan 2021 09:03:16 -0000      1.566
@@ -4329,10 +4329,25 @@
 "приводить потребителей в бешенство</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# | 
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>-]
+# | 
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\";>+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -4390,7 +4405,10 @@
 "безопасности и конфиденциальности</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+# | Copyright &copy; 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -4741,13 +4759,32 @@
 "a>."
 
 #. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | &ldquo;complete gacha&rdquo;-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# | 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#| "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 "Многие популярные мобильные игры 
основаны на системе гач, которая "
 "используется для превращения телефонов в 
игровые автоматы с 2010&nbsp;года. "
@@ -5732,6 +5769,10 @@
 "Android, которые являются тиранами</a> (хотя 
кто-то нашел способ взломать "
 "ограничение)."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9270,9 +9311,21 @@
 msgstr "Игры"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# | 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -9373,16 +9426,21 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "&ldquo;Лутбоксы&rdquo; представляют прямое 
приложение механизма случайного "
 "вознаграждения, а зависимость от них 
повышается посредством соблазнительной "
 "мультипликации. Это <a 
href=\"https://www.pcgamer.com/behind-the-addictive-";
-"psychology-and-seductive-art-of-loot-boxes/\"> сродни азартным 
играм</a>, "
-"также как <a 
href=\"https://wikipedia.org/wiki/Gacha_game\";>гача-игры</a>, "
-"очень популярные в Азии, которых можно 
считать предшественниками лутбоксов."
+"psychology-and-seductive-art-of-loot-boxes/\"> сродни азартным 
играм</a>."
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
@@ -12654,16 +12712,66 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Автомобили Tesla позволяют компании 
получать данные на расстоянии, а "
+#~ "также определять местоположение 
автомобиля в любой момент (см. параграфы "
+#~ "b и c раздела&nbsp;2 <a 
href=\"http://www.teslamotors.com/sites/default/";
+#~ "files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\"> в "
+#~ "уведомлении о конфиденциальности</a>). 
Компания утверждает, что она не "
+#~ "хранит этих сведений, но если 
государство приказывает собирать и "
+#~ "передавать эти данные, то оно может их 
сохранять."
+
+#~ msgid ""
+#~ "Many popular mobile games are based on the gacha system, which has been "
+#~ "turning phones into slot machines ever since 2010. The &ldquo;complete "
+#~ "gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#~ "variants are still exploiting users</a>."
+#~ msgstr ""
+#~ "Многие популярные мобильные игры 
основаны на системе гач, которая "
+#~ "используется для превращения телефонов 
в игровые автоматы с 2010&nbsp;"
+#~ "года. В 2012 году вариант с &ldquo;полной 
гачей&rdquo; в Японии объявили "
+#~ "незаконным, но <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> законные варианты все 
равно эксплуатируют "
+#~ "пользователей</a>."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Многие игры проектируются так, чтобы 
игроки принуждались продолжать "
+#~ "игру&nbsp;&mdash; и возобновлять свою 
подписку. Чтобы достичь этого, "
+#~ "разработчики пользуются <a 
href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\"> 
приемами, "
+#~ "вытекающими из исследований поведения и 
мозга</a>:"
+
+#~ msgid ""
 #~ "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 #~ "mechanism, and their addictiveness is enhanced by seductive animation. "
 #~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
-#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
 #~ msgstr ""
 #~ "&ldquo;Лутбоксы&rdquo; представляют прямое 
приложение механизма "
 #~ "случайного вознаграждения, а 
зависимость от них повышается посредством "
 #~ "соблазнительной мультипликации. Это <a 
href=\"https://www.pcgamer.com/";
 #~ "behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\"> "
-#~ "сродни азартным играм</a>."
+#~ "сродни азартным играм</a>, также как <a 
href=\"https://wikipedia.org/wiki/";
+#~ "Gacha_game\">гача-игры</a>, очень популярные в 
Азии, которых можно "
+#~ "считать предшественниками лутбоксов."
 
 #~ msgid ""
 #~ "The major social networks are continuously optimizing their design to <a "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- tr.po       11 Jan 2021 09:34:36 -0000      1.119
+++ tr.po       12 Jan 2021 09:03:17 -0000      1.120
@@ -3131,7 +3131,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3167,7 +3167,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <title>
@@ -3465,12 +3465,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4163,6 +4164,12 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -6660,9 +6667,16 @@
 msgstr "Oyunlar"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -6764,19 +6778,11 @@
 "yolları da vardır."
 
 #. type: Content of: <div><div><ul><li>
-#, fuzzy
-#| msgid ""
-#| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
-#| "mechanism, and their addictiveness is enhanced by seductive animation. "
-#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
-#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgid ""
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
 "&ldquo;Yağma sandıkları&rdquo;, rastgele ödül mekanizmasının doğrudan 
bir "
 "uygulamasıdır ve bağımlılık yapıcılıkları baştan çıkarıcı 
animasyon ile "
@@ -6786,6 +6792,15 @@
 
 #. type: Content of: <div><div><ul><li>
 msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
 "The developers of gratis mobile games apply the techniques described above "
 "to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/";
 "\"> turn their products into slot machines</a>. This is clearly described in "
@@ -9533,10 +9548,32 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Birçok oyun; oyuncuların takıntılı bir şekilde oynamasını 
sağlamak&mdash;"
+#~ "ve aboneliklerinin yenilenmesi için tasarlanmıştır. Bu sonucu elde 
etmek "
+#~ "için geliştiriciler, <a href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">davranış 
ve "
+#~ "beyin araştırmalarından elde edilen yöntemleri</a> kullanırlar:"
+
+#, fuzzy
+#~| msgid ""
+#~| "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
+#~| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#~| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
+#~| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ msgid ""
 #~ "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 #~ "mechanism, and their addictiveness is enhanced by seductive animation. "
 #~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-";
-#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
 #~ msgstr ""
 #~ "&ldquo;Yağma sandıkları&rdquo;, rastgele ödül mekanizmasının 
doğrudan bir "
 #~ "uygulamasıdır ve bağımlılık yapıcılıkları baştan çıkarıcı 
animasyon ile "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- zh-cn.po    11 Jan 2021 09:34:36 -0000      1.121
+++ zh-cn.po    12 Jan 2021 09:03:17 -0000      1.122
@@ -3129,7 +3129,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3167,7 +3167,7 @@
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
 #| "Software Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
 "Software Foundation, Inc."
@@ -3442,12 +3442,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4117,6 +4118,16 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -6589,7 +6600,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -6666,9 +6677,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- zh-tw.po    11 Jan 2021 09:34:36 -0000      1.266
+++ zh-tw.po    12 Jan 2021 09:03:17 -0000      1.267
@@ -3131,7 +3131,7 @@
 msgid ""
 "Tesla cars allow the company to extract data remotely and determine the "
 "car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/";
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/";
 "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
 "The company says it doesn't store this information, but if the state orders "
 "it to get the data and hand it over, the state can store it."
@@ -3165,13 +3165,13 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2017-2020+} Free
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2017-2021+} Free
 # | Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #| "Foundation, Inc."
-msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 msgstr ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
@@ -3409,12 +3409,13 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The &ldquo;complete "
-"gacha&rdquo; variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-";
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/";
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -4056,6 +4057,18 @@
 "tyrants</a> (though someone found a way to crack the restriction)."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2017-2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | [-Proprietary Software-]{+Malware in Online Conferencing+} - GNU Project -
 # | Free Software Foundation
@@ -6453,7 +6466,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
 "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
@@ -6530,9 +6543,16 @@
 "&ldquo;Loot boxes&rdquo; are a direct application of the random reward "
 "mechanism, and their addictiveness is enhanced by seductive animation. They "
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\";>gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\";><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]