www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/fighting-software-patents.ta.htm...


From: GNUN
Subject: www philosophy/fighting-software-patents.ta.htm...
Date: Mon, 1 Feb 2021 06:02:32 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/02/01 06:02:31

Modified files:
        philosophy     : fighting-software-patents.ta.html 
        philosophy/po  : fighting-software-patents.ta.po 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 
Added files:
        philosophy/po  : fighting-software-patents.ta-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/fighting-software-patents.ta.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/fighting-software-patents.ta.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/fighting-software-patents.ta-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.495&r2=1.496
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.391&r2=1.392
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.438&r2=1.439
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.463&r2=1.464
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.350&r2=1.351
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.594&r2=1.595
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.280&r2=1.281

Patches:
Index: philosophy/fighting-software-patents.ta.html
===================================================================
RCS file: /web/www/www/philosophy/fighting-software-patents.ta.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/fighting-software-patents.ta.html        1 Feb 2021 10:36:44 
-0000       1.14
+++ philosophy/fighting-software-patents.ta.html        1 Feb 2021 11:02:25 
-0000       1.15
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/fighting-software-patents.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/fighting-software-patents.ta.po">
+ https://www.gnu.org/philosophy/po/fighting-software-patents.ta.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/fighting-software-patents.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/fighting-software-patents.ta-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2014-03-14" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/fighting-software-patents.en.html" -->
 
 <!--#include virtual="/server/header.ta.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/fighting-software-patents.translist" -->
 <!--#include virtual="/server/banner.ta.html" -->
+<!--#include virtual="/server/outdated.ta.html" -->
 <h2>மென்பொருள் படைப்புரிமத்தை 
எதிர்த்து - கூட்டாகவும் 
தனியாகவும்குனு திட்டம்</h2>
 
 <p>ரிச்சர்ட் எம். ஸ்டால்மேன்</p>
@@ -151,7 +157,7 @@
 <p class="unprintable"><!-- timestamp start -->
 புதுப்பிக்கப் பட்ட விவரம்:
 
-$Date: 2021/02/01 10:36:44 $
+$Date: 2021/02/01 11:02:25 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/fighting-software-patents.ta.po
===================================================================
RCS file: /web/www/www/philosophy/po/fighting-software-patents.ta.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/fighting-software-patents.ta.po       1 Feb 2021 10:37:39 
-0000       1.4
+++ philosophy/po/fighting-software-patents.ta.po       1 Feb 2021 11:02:25 
-0000       1.5
@@ -219,11 +219,21 @@
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
+#. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and submitting "
+#| "translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
 "\">Translations README</a> for information on coordinating and submitting "
 "translations of this article."
 msgstr ""
+"இந்த கட்டுரையின் 
மொழிபெயர்ப்பை 
ஒருங்கிணைப்பது, 
சமர்ப்பிப்பது தொடர்பான 
விவரங்களுக்கு <a "
+"href=\"/server/standards/README.translations.html\">மொழிபெயர்ப்புகள்
 README "
+"கோப்பைக்</a> காணவும்."
 
 #. type: Content of: <div><p>
 msgid "Copyright &copy; 2004 Richard Stallman"

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary/po/de.po        31 Jan 2021 17:33:50 -0000      1.280
+++ proprietary/po/de.po        1 Feb 2021 11:02:25 -0000       1.281
@@ -8139,6 +8139,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -8162,10 +8179,33 @@
 "USA und der EU), dass das Netz alle Standortdaten für Monate oder Jahre "
 "speichert."
 
+#. type: Content of: <div><div><div><h3>
+# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
+#, fuzzy
+#| msgid "Type&nbsp;of malware"
+msgid "Types of malware in mobiles"
+msgstr "Art der Schadsoftware"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#addictions\">Addictions</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#deception\">Täuschung</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Täuschung</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr ""
+
 # "Ein Mobiltelefon kann in ein Mikrofon und Sender umgewandelt werden, um
 #  Gespräche in der Nähe des Telefons abzuhören."
 # --Sicherheitsbüro des US-Handelsministeriums
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -8179,7 +8219,7 @@
 "Gespräche <ins>in der Nähe des Telefons</ins> abzuhören und zu 
übertragen</"
 "a>."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 # | The back door <a {+class=\"not-a-duplicate\"+}
 # | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
 # | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
@@ -8207,7 +8247,7 @@
 "a>. Die Entscheidung, die Sicherheitslücken zu belassen, ist moralisch "
 "gleichbedeutend mit dem Schreiben einer Hintertür."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -8219,7 +8259,7 @@
 "Prozessor das Mikrofon. In den meisten Fällen ist es auch möglich die "
 "Software für den Hauptprozessor neu zu schreiben."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -8231,7 +8271,7 @@
 "ändern kann. Sie haben zwar immer noch die Hintertür, aber zumindest ist es 
"
 "nicht möglich das Telefon zu einem Abhörgerät umzubiegen."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -8247,48 +8287,6 @@
 "a>. Das bedeutet, deren Bewegungen werden nachverfolgt und möglicherweise "
 "funktioniert das Abhören auch."
 
-#. type: Content of: <div><div><div><h3>
-# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
-#, fuzzy
-#| msgid "Type&nbsp;of malware"
-msgid "Types of malware in mobiles"
-msgstr "Art der Schadsoftware"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#deception\">Deception</a>-]
-# | {+href=\"#addictions\">Addictions</a>+}
-#, fuzzy
-#| msgid "<a href=\"#deception\">Deception</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#deception\">Täuschung</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Täuschung</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr ""
-
-#. type: Content of: <div><div><p>
-# | See above for the <a [-href=\"#universal-back-door\">general-]
-# | {+href=\"#universal-back-door-phone-modem\">general+} universal back
-# | door</a> in essentially all mobile phones, which permits converting them
-# | into full-time listening devices.
-#, fuzzy
-#| msgid ""
-#| "See above for the <a href=\"#universal-back-door\">general universal back "
-#| "door</a> in essentially all mobile phones, which permits converting them "
-#| "into full-time listening devices."
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Siehe oben für die in praktisch allen Mobiltelefonen vorhandene <a href="
-"\"#universal-back-door\">allgemeine universelle Hintertür</a>, die es "
-"ermöglicht, sie in Vollzeit-Abhörgeräte umzuschalten."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -12373,6 +12371,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -14570,6 +14576,20 @@
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "See above for the <a href=\"#universal-back-door\">general universal "
+#~| "back door</a> in essentially all mobile phones, which permits converting "
+#~| "them into full-time listening devices."
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Siehe oben für die in praktisch allen Mobiltelefonen vorhandene <a href="
+#~ "\"#universal-back-door\">allgemeine universelle Hintertür</a>, die es "
+#~ "ermöglicht, sie in Vollzeit-Abhörgeräte umzuschalten."
+
 #~ msgid ""
 #~ "Vizio goes a step further than other TV manufacturers in spying on their "
 #~ "users: their <a href=\"http://www.propublica.org/article/own-a-vizio-";

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- proprietary/po/es.po        31 Jan 2021 17:33:50 -0000      1.396
+++ proprietary/po/es.po        1 Feb 2021 11:02:25 -0000       1.397
@@ -8149,6 +8149,23 @@
 msgid "Cell-phone communications"
 msgstr "Comunicaciones a través del móvil"
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -8169,7 +8186,30 @@
 "registre su ubicación. Muchos países (incluidos EE. UU. y la UE) exige que "
 "la red guarde los datos de esas ubicaciones durante meses o años."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
+#, fuzzy
+#| msgid "Type&nbsp;of malware"
+msgid "Types of malware in mobiles"
+msgstr "Tipo de <cite>malware</cite>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#addictions\">Addictions</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#deception\">Trampas</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Trampas</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr "Adicciones"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -8181,7 +8221,7 @@
 "archives/2006/12/remotely_eavesd_1.html\">a menudo se utiliza para hacer que "
 "el teléfono transmita todas las conversaciones que escucha</a>."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -8195,7 +8235,7 @@
 "corregirse</a>. La decisión de dejar esos agujeros de seguridad es desde el "
 "punto de vista ético equivalente a colocar una puerta trasera."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -8208,7 +8248,7 @@
 "tiene, además, la capacidad de reescribir el software del procesador "
 "principal."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -8220,7 +8260,7 @@
 "del procesador principal. Siguen teniendo la puerta trasera, pero al menos "
 "no es capaz de convertir el teléfono en un dispositivo de escucha."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -8235,48 +8275,6 @@
 "rastrean sus movimientos, y que incluso podría poner en funcionamiento el "
 "sistema de escucha."
 
-#. type: Content of: <div><div><div><h3>
-# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
-#, fuzzy
-#| msgid "Type&nbsp;of malware"
-msgid "Types of malware in mobiles"
-msgstr "Tipo de <cite>malware</cite>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#deception\">Deception</a>-]
-# | {+href=\"#addictions\">Addictions</a>+}
-#, fuzzy
-#| msgid "<a href=\"#deception\">Deception</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#deception\">Trampas</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Trampas</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr "Adicciones"
-
-#. type: Content of: <div><div><p>
-# | See above for the <a [-href=\"#universal-back-door\">general-]
-# | {+href=\"#universal-back-door-phone-modem\">general+} universal back
-# | door</a> in essentially all mobile phones, which permits converting them
-# | into full-time listening devices.
-#, fuzzy
-#| msgid ""
-#| "See above for the <a href=\"#universal-back-door\">general universal back "
-#| "door</a> in essentially all mobile phones, which permits converting them "
-#| "into full-time listening devices."
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Vea más arriba acerca de la <a href=\"#universal-back-door\">puerta trasera "
-"universal general</a> presente en prácticamente todos los teléfonos 
móviles, "
-"lo que permite convertirlos en dispositivos de escucha a tiempo completo."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -12910,6 +12908,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -14953,6 +14959,21 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "See above for the <a href=\"#universal-back-door\">general universal "
+#~| "back door</a> in essentially all mobile phones, which permits converting "
+#~| "them into full-time listening devices."
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Vea más arriba acerca de la <a href=\"#universal-back-door\">puerta "
+#~ "trasera universal general</a> presente en prácticamente todos los "
+#~ "teléfonos móviles, lo que permite convertirlos en dispositivos de 
escucha "
+#~ "a tiempo completo."
+
 #~ msgid ""
 #~ "Vizio goes a step further than other TV manufacturers in spying on their "
 #~ "users: their <a href=\"http://www.propublica.org/article/own-a-vizio-";

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.495
retrieving revision 1.496
diff -u -b -r1.495 -r1.496
--- proprietary/po/fr.po        31 Jan 2021 18:10:01 -0000      1.495
+++ proprietary/po/fr.po        1 Feb 2021 11:02:25 -0000       1.496
@@ -6943,6 +6943,23 @@
 msgid "Cell-phone communications"
 msgstr "Téléphonie mobile"
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -6964,7 +6981,23 @@
 "Unis et l'Union européenne) exigent que le réseau conserve toutes ces "
 "données de localisation pendant des mois ou des années."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+msgid "Types of malware in mobiles"
+msgstr "Types de malveillance dans les mobiles"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#addictions\">Addiction</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr "Addiction"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -6976,7 +7009,7 @@
 "remotely_eavesd_1.html\">souvent utilisée pour forcer le téléphone à "
 "transmettre toutes les conversations qu'il entend</a>."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -6990,7 +7023,7 @@
 "20 ans</a>. Le choix de laisser ces failles de sécurité en place est "
 "l'équivalent moral de la création d'une porte dérobée."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -7002,7 +7035,7 @@
 "processeur du modem a le contrôle du micro et en général il a aussi la "
 "capacité de réécrire le logiciel du processeur principal."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -7015,7 +7048,7 @@
 "dérobée, mais au moins elle est incapable de transformer le téléphone en "
 "appareil d'écoute."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -7030,32 +7063,6 @@
 "\">transmettre même quand ils sont éteints</a>. Cela signifie que leurs "
 "mouvements sont suivis et que la fonction d'écoute peut être rendue 
opérante."
 
-#. type: Content of: <div><div><div><h3>
-msgid "Types of malware in mobiles"
-msgstr "Types de malveillance dans les mobiles"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#addictions\">Addiction</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr "Addiction"
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Voir plus haut ce qui concerne la <a href=\"#universal-back-door-phone-modem"
-"\">porte dérobée universelle</a>, présente dans presque tous les 
téléphones "
-"mobiles et permettant de les convertir en appareils d'écoute permanente."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -10980,6 +10987,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -12736,6 +12751,16 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Voir plus haut ce qui concerne la <a href=\"#universal-back-door-phone-"
+#~ "modem\">porte dérobée universelle</a>, présente dans presque tous les "
+#~ "téléphones mobiles et permettant de les convertir en appareils d'écoute 
"
+#~ "permanente."
+
+#~ msgid ""
 #~ "We can suppose Microsoft look at users' files for the US government on "
 #~ "demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. "
 #~ "Will it look at users' files for the Chinese government on demand?"

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary/po/it.po        31 Jan 2021 17:33:50 -0000      1.280
+++ proprietary/po/it.po        1 Feb 2021 11:02:26 -0000       1.281
@@ -7591,6 +7591,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -7605,7 +7622,30 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
+#, fuzzy
+#| msgid "Type&nbsp;of malware"
+msgid "Types of malware in mobiles"
+msgstr "Tipo&nbsp;di malware"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#addictions\">Addictions</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#deception\">Inganni</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Inganni</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr ""
+
+#. type: Content of: <div><div><p>
 # | [-The-]{+Almost every phone's communication processor has a+} universal
 # | back door [-in portable phones-] {+which is+} <a
 # | 
href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\";>
@@ -7627,7 +7667,7 @@
 "\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/\";> "
 "usata per ascoltare attraverso i loro microfoni</a>."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 # | [-More about-]{+The back door+} <a
 # | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
 # | nature-] {+class=\"not-a-duplicate\"
@@ -7651,7 +7691,7 @@
 "The_second_operating_system_hiding_in_every_mobile_phone\">natura di questo "
 "problema</a>."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -7659,7 +7699,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -7667,7 +7707,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 # | [-Most mobile phones have this-]{+The+} universal back [-door, which has
 # | been-] {+door is apparently also+} used to {+make phones+} <a
 # | 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\";>
@@ -7692,50 +7732,6 @@
 "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
 "\">renderli malevoli</a>."
 
-#. type: Content of: <div><div><div><h3>
-# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
-#, fuzzy
-#| msgid "Type&nbsp;of malware"
-msgid "Types of malware in mobiles"
-msgstr "Tipo&nbsp;di malware"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#deception\">Deception</a>-]
-# | {+href=\"#addictions\">Addictions</a>+}
-#, fuzzy
-#| msgid "<a href=\"#deception\">Deception</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#deception\">Inganni</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Inganni</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr ""
-
-#. type: Content of: <div><div><p>
-# | [-This is separate from-]{+See above for the+} <a
-# | [-href=\"#universal-back-door-phone-modem\">the-]
-# | {+href=\"#universal-back-door-phone-modem\">general+} universal back
-# | [-door-] {+door</a>+} in [-the modem processor that the local phone
-# | company can use</a>.-] {+essentially all mobile phones, which permits
-# | converting them into full-time listening devices.+}
-#, fuzzy
-#| msgid ""
-#| "This is separate from <a href=\"#universal-back-door-phone-modem\">the "
-#| "universal back door in the modem processor that the local phone company "
-#| "can use</a>."
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Questa non va confusa con la <a href=\"#universal-back-door-phone-modem"
-"\">backdoor universale nel processore del modem</a> che può essere usata "
-"dalla compagnia telefonica locale."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -11492,6 +11488,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -13655,6 +13659,20 @@
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "This is separate from <a href=\"#universal-back-door-phone-modem\">the "
+#~| "universal back door in the modem processor that the local phone company "
+#~| "can use</a>."
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Questa non va confusa con la <a href=\"#universal-back-door-phone-modem"
+#~ "\">backdoor universale nel processore del modem</a> che può essere usata "
+#~ "dalla compagnia telefonica locale."
+
 #~ msgid ""
 #~ "Vizio goes a step further than other TV manufacturers in spying on their "
 #~ "users: their <a href=\"http://www.propublica.org/article/own-a-vizio-";

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- proprietary/po/ja.po        31 Jan 2021 17:33:50 -0000      1.288
+++ proprietary/po/ja.po        1 Feb 2021 11:02:26 -0000       1.289
@@ -5943,6 +5943,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -5957,7 +5974,29 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+#, fuzzy
+#| msgid "Type&nbsp;of malware"
+msgid "Types of malware in mobiles"
+msgstr "マルウェアのタイプ"
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#back-doors\">Back doors</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#back-doors\">バックドア</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#back-doors\">Back doors</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#back-doors\">バックドア</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr ""
+
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The universal back door in portable phones <a href=\"https://www.schneier.";
@@ -5973,7 +6012,7 @@
 
"archives/2006/12/remotely_eavesd_1.html\">そのマイクロフォンで盗聴するのに使"
 "われています</a>。"
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -5982,7 +6021,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -5990,7 +6029,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -5998,7 +6037,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Most mobile phones have a universal back door, which has been used to <a "
@@ -6017,35 +6056,6 @@
 
"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\">携帯"
 
"電話を悪意のあるものに変える</a>のに使われてきました。"
 
-#. type: Content of: <div><div><div><h3>
-#, fuzzy
-#| msgid "Type&nbsp;of malware"
-msgid "Types of malware in mobiles"
-msgstr "マルウェアのタイプ"
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#back-doors\">Back doors</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#back-doors\">バックドア</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#back-doors\">Back doors</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#back-doors\">バックドア</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -9087,6 +9097,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary/po/malware-mobiles.de-diff.html 31 Jan 2021 17:33:51 -0000      
1.98
+++ proprietary/po/malware-mobiles.de-diff.html 1 Feb 2021 11:02:26 -0000       
1.99
@@ -120,7 +120,23 @@
 <span class="inserted"><ins><em>&lt;div class="frame"&gt;
 &lt;h3 id="phone-communications"&gt;Cell-phone communications&lt;/h3&gt;
 
+&lt;p&gt;This section describes one other malicious characteristic of mobile
+phones, location tracking which is caused by the underlying radio system
+rather than by the specific software in them.&lt;/p&gt;
+
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201502100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -134,13 +150,49 @@
     (including the US and the EU) require the network to store all
     these location data for months or years.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost every phone's communication 
processor</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/div&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201311120.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
+&lt;div id="TOC" class="toc-inline"&gt;
+&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;a href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+  &lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;h3 id="addictions"&gt;Addictions&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201604040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
+    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
+
     &lt;p id="universal-back-door-phone-modem"&gt;
-    Almost</em></ins></span> every phone's communication processor has
+    Almost every phone's communication processor</em></ins></span> has
     a universal back door which is &lt;a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
     often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
@@ -167,173 +219,93 @@
     
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
     transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
     are tracked, and may also make the listening feature work.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-<span class="removed"><del><strong>&lt;p&gt;Here are 
examples</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
-
-&lt;div id="TOC" class="toc-inline"&gt;
-&lt;h3&gt;Types</em></ins></span> of malware in <span 
class="removed"><del><strong>mobile devices.  See also
-the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
-page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
-
-&lt;div class="summary" style="margin-top: 1em"&gt;
-&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>mobiles&lt;/h3&gt;</em></ins></span>
-&lt;ul&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a</em></ins></span> href="#back-doors"&gt;Back 
doors&lt;/a&gt;&lt;/li&gt;
-&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a</em></ins></span> 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
-<span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a 
href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
-&lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;</strong></del></span>
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;a <span class="removed"><del><strong>href="#drm"&gt;Digital 
restrictions
-    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their 
computers.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Jails&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application 
programs.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system not &ldquo;authorized&rdquo; by the
-    manufacturer.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-&lt;/ul&gt;
-&lt;/div&gt;
-
-&lt;h3 <span class="removed"><del><strong>id="back-doors"&gt;Mobile Back 
Doors&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door"&gt;general</strong></del></span> <span 
class="inserted"><ins><em>id="addictions"&gt;Addictions&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
-
-    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general</em></ins></span> universal 
back
-    door&lt;/a&gt; in essentially all mobile phones, which permits converting
-    them into full-time listening devices.&lt;/p&gt;
   <span class="removed"><del><strong>&lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running proprietary Android 
versions</strong></del></span>
+&lt;p&gt;Here are examples</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202001090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Android phones subsidized by the US government</em></ins></span> 
come with <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
     
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
-    preinstalled adware and</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt; that provides remote access to the 
data stored on the
-  device.&lt;/p&gt;
-  &lt;/li&gt;
+    preinstalled adware and a back door for forcing 
installation</em></ins></span> of <span 
class="removed"><del><strong>malware</strong></del></span>
+    <span class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-  Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The adware is</em></ins></span> in <span 
class="removed"><del><strong>mobile devices.  See also
+the</strong></del></span> <span class="inserted"><ins><em>a modified version 
of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;the 
Apple malware
+page&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    universal back door</em></ins></span> for <span 
class="inserted"><ins><em>firmware&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;
-  &lt;p&gt;In Android,
-  &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has</strong></del></span> <span class="inserted"><ins><em>door for 
forcing installation of
-    apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;In other words, a program whose raison d'être 
is</em></ins></span> malicious <span 
class="removed"><del><strong>functionalities specific</strong></del></span> 
<span class="inserted"><ins><em>has
+    a secret secondary malicious purpose. All this is in 
addition</em></ins></span> to the <span class="removed"><del><strong>Apple 
iThings.&lt;/p&gt;
 
-    &lt;p&gt;The adware is in</em></ins></span> a <span 
class="inserted"><ins><em>modified version of an
-    essential system configuration app. The</em></ins></span> back door <span 
class="inserted"><ins><em>is a
-    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps.&lt;/a&gt;  (It was 
in</strong></del></span> a program <span class="removed"><del><strong>called 
GTalkService, which seems since then to have been
-  merged into Google Play.)
-  &lt;/p&gt;
-
-  &lt;p&gt;
-  Google can also
-  &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-  forcibly and remotely install apps&lt;/a&gt; through Google Play.
-  This</strong></del></span> <span class="inserted"><ins><em>whose stated 
purpose</em></ins></span> is <span class="removed"><del><strong>not 
equivalent</strong></del></span> to <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;</em></ins></span>
-    universal back <span class="removed"><del><strong>door, but permits various
-  dirty tricks.
-  &lt;/p&gt;
-
-  &lt;p&gt;
-  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this 
power</strong></del></span> <span class="inserted"><ins><em>door for 
firmware&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;In other words, a program whose raison d'être is 
malicious</em></ins></span> has <span class="removed"><del><strong>not 
been</strong></del></span>
-    <span class="inserted"><ins><em>a secret secondary</em></ins></span> 
malicious <span class="removed"><del><strong>so far, the 
point</strong></del></span> <span class="inserted"><ins><em>purpose. All 
this</em></ins></span> is <span class="removed"><del><strong>that nobody should 
have such power,
-  which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>in 
addition</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>the
-    malware of Android itself.&lt;/p&gt;
+&lt;div class="summary" style="margin-top: 1em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means 
functionalities</strong></del></span>
+    <span class="inserted"><ins><em>malware of Android itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A very popular app found in the
-    Google Play store contained</em></ins></span> a
-  <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>module</em></ins></span> that <span 
class="removed"><del><strong>it
-  considers malicious.  But there is no excuse for allowing 
it</strong></del></span> <span class="inserted"><ins><em>was 
designed</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt; the programs, and you 
should have</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    Google Play store contained a module that was</em></ins></span> designed 
to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware on</em></ins></span> the <span 
class="removed"><del><strong>right to
-  decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;. The app developers
-    regularly used it</em></ins></span> to <span 
class="removed"><del><strong>trust in this way.
-  &lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
-
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</strong></del></span> <span class="inserted"><ins><em>make</em></ins></span> 
the <span class="removed"><del><strong>file</strong></del></span> <span 
class="inserted"><ins><em>computer download and execute any 
code</em></ins></span>
-    they <span class="removed"><del><strong>do not count as malware. We 
mention them</strong></del></span> <span 
class="inserted"><ins><em>wanted.&lt;/p&gt;
-
-    &lt;p&gt;This is a concrete example of what users are 
exposed</em></ins></span> to <span class="removed"><del><strong>refute the
-  supposition that prestigious proprietary software doesn't have grave
-  bugs.&lt;/p&gt;
+    install malware on the user's computer&lt;/a&gt;. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.&lt;/p&gt;
 
-&lt;ul&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</strong></del></span> <span class="inserted"><ins><em>when they
-    run nonfree apps. They</em></ins></span> can <span 
class="inserted"><ins><em>never</em></ins></span> be
-  <span class="removed"><del><strong>&lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs</strong></del></span> <span class="inserted"><ins><em>completely 
sure</em></ins></span> that <span class="removed"><del><strong>play 
commands</strong></del></span> <span class="inserted"><ins><em>a nonfree
+    &lt;p&gt;This is a concrete example of</em></ins></span> what users <span 
class="inserted"><ins><em>are exposed to when they
+    run nonfree apps. They</em></ins></span> can <span 
class="removed"><del><strong>do</strong></del></span> <span 
class="inserted"><ins><em>never be completely sure that a nonfree
     app is safe.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Xiaomi phones come with &lt;a
+    &lt;p&gt;Xiaomi phones come</em></ins></span> with <span 
class="removed"><del><strong>the data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
-    a universal back door</em></ins></span> in <span 
class="removed"><del><strong>ultrasound</strong></del></span> <span 
class="inserted"><ins><em>the application processor, for Xiaomi's
+    a universal back door</em></ins></span> in <span 
class="removed"><del><strong>their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; 
by</strong></del></span> the
+    <span class="removed"><del><strong>manufacturer.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;See above</strong></del></span> <span 
class="inserted"><ins><em>application processor,</em></ins></span> for <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>humans can't hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the local 
phone
-    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This is separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door"&gt;general</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
+    universal back
+      <span class="removed"><del><strong>door&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>door</em></ins></span> in <span 
class="removed"><del><strong>essentially all mobile phones, which permits 
converting
+      them into full-time listening devices.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the modem processor that the local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
+  &lt;li id="M201511090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;</em></ins></span>
-    can <span class="removed"><del><strong>be hijacked through their Wi-Fi 
chips&lt;/a&gt; because</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;upload files&rdquo; as well as forcibly install
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
@@ -344,29 +316,26 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version</em></ins></span> of <span 
class="inserted"><ins><em>Android has</em></ins></span> a <span 
class="removed"><del><strong>bug in
-       Broadcom's non-free firmware.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Samsung</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt;. Nearly
-    all models of mobile</em></ins></span> phones <span 
class="inserted"><ins><em>have a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have</strong></del></span>
 <span class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;
+    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+    all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
-    to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
+    to introduce another? Because this one is controlled by 
Coolpad.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201403120.1"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="samsung"&gt;&lt;a
+    &lt;p id="samsung"&gt;&lt;a</em></ins></span>
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-    Samsung Galaxy devices running proprietary Android versions come 
with</em></ins></span>
-    a <span class="removed"><del><strong>security hole</strong></del></span> 
<span class="inserted"><ins><em>back door&lt;/a&gt;</em></ins></span> that 
<span class="removed"><del><strong>allows an SMS message</strong></del></span> 
<span class="inserted"><ins><em>provides remote access</em></ins></span> to 
<span class="removed"><del><strong>install
-ransomware&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the files stored on
-    the device.&lt;/p&gt;</em></ins></span>
+    Samsung Galaxy devices running proprietary Android versions come with
+    a back door&lt;/a&gt; that provides remote access to the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>files</em></ins></span> stored on
+    the device.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  Samsung's back door&lt;/a&gt; provides access</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -375,100 +344,88 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202002020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;Many <span class="removed"><del><strong>proprietary 
payment</strong></del></span> <span 
class="inserted"><ins><em>Android</em></ins></span> apps <span 
class="removed"><del><strong>&lt;a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data in an insecure way&lt;/a&gt;.
-However,</strong></del></span> <span class="inserted"><ins><em>fool their 
users by asking
-    them to decide what permissions to give</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these apps is 
that</strong></del></span> <span class="inserted"><ins><em>program, and 
then</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment</strong></del></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android apps fool their users by asking
+    them</em></ins></span> to <span class="removed"><del><strong>any file on 
the system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+  &lt;p&gt;In Android,
+  &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door</strong></del></span> <span 
class="inserted"><ins><em>decide what permissions</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps.&lt;/a&gt;  (It was in a
+  program called GTalkService, which seems since</strong></del></span> <span 
class="inserted"><ins><em>give the program, and</em></ins></span> then <span 
class="removed"><del><strong>to have been
+  merged into Google Play.)
+  &lt;/p&gt;
+
+  &lt;p&gt;
+  Google can also</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+  forcibly and remotely install apps&lt;/a&gt; through Google Play.
+  This</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
     bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The Android system</em></ins></span> is <span 
class="removed"><del><strong>not anonymous&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;The Android system</em></ins></span> is <span 
class="removed"><del><strong>not equivalent</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span> to <span 
class="removed"><del><strong>a universal back door,</strong></del></span> <span 
class="inserted"><ins><em>prevent data leaks by running apps
+    in isolated sandboxes,</em></ins></span> but <span 
class="removed"><del><strong>permits various
+  dirty tricks.
+  &lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap</strong></del></span> <span 
class="inserted"><ins><em>supposed to prevent</em></ins></span> data <span 
class="inserted"><ins><em>leaks by running apps</em></ins></span>
-    in <span class="removed"><del><strong>smart phones, including iPhones, 
Android,</strong></del></span> <span class="inserted"><ins><em>isolated 
sandboxes, but developers have found ways to access the
-    data by other means,</em></ins></span> and
-  <span class="removed"><del><strong>BlackBerry&lt;/a&gt;. 
While</strong></del></span> there is <span class="removed"><del><strong>not 
much detail here, it seems that this
-  does not operate via</strong></del></span> <span 
class="inserted"><ins><em>nothing</em></ins></span> the <span 
class="removed"><del><strong>universal back door that we know nearly all
-  portable phones have. It may involve exploiting various bugs. There are
-   &lt;a href="#universal-back-door"&gt;
-  lots of bugs in</strong></del></span> <span class="inserted"><ins><em>user 
can do to stop
-    them from doing so, since both</em></ins></span> the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>system and the apps are 
nonfree.&lt;/p&gt;</em></ins></span>
+  &lt;p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+  malicious so far, the point is that nobody should</strong></del></span> 
<span class="inserted"><ins><em>developers</em></ins></span> have <span 
class="removed"><del><strong>such power,
+  which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>found 
ways</em></ins></span> to <span class="removed"><del><strong>let a
+  security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+  considers malicious.  But</strong></del></span> <span 
class="inserted"><ins><em>access the
+    data by other means, and</em></ins></span> there is <span 
class="removed"><del><strong>no excuse for allowing it</strong></del></span> 
<span class="inserted"><ins><em>nothing the user can do</em></ins></span> to 
<span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>stop
+    them from doing so, since both</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>system</em></ins></span> and <span 
class="removed"><del><strong>you should have</strong></del></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>apps are nonfree.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Mobile 
Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Sarahah app 
-      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book</strong></del></span> <span 
class="inserted"><ins><em>id="drm"&gt;DRM&lt;/h3&gt;
-
-&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; 
refers</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span>
-<span class="inserted"><ins><em>functionalities designed</em></ins></span> to 
<span class="removed"><del><strong>zero price.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
   
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold</strong></del></span> <span class="inserted"><ins><em>restrict what 
users can do</em></ins></span> with <span class="removed"><del><strong>spyware 
sending lots of</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> data <span 
class="removed"><del><strong>to China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's</strong></del></span>
-<span class="inserted"><ins><em>in their computers.&lt;/p&gt;
+&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; 
refers</em></ins></span> to
+  <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span>
+<span class="inserted"><ins><em>functionalities designed</em></ins></span> to 
<span class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>restrict what users can do with the 
data</em></ins></span>
+in <span class="removed"><del><strong>this way.
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
computers.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201501030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix 
Android</em></ins></span> app <span class="removed"><del><strong>listens all 
the time,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-  on what people are listening to or watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+    &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
+    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
     forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
-    Netflix uses</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>enforce the geolocation restrictions dictated by the
+    Netflix uses to enforce the geolocation restrictions dictated by the
     movie studios.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Mobile 
Insecurity&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="insecurity"&gt;Insecurity&lt;/h3&gt;</em></ins></span>
 
-&lt;p&gt;These bugs are/were not intentional, so unlike</em></ins></span> the 
<span class="removed"><del><strong>privacy and security</strong></del></span> 
<span class="inserted"><ins><em>rest</em></ins></span> of <span 
class="removed"><del><strong>283</strong></del></span> <span 
class="inserted"><ins><em>the file
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Siri,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Out of 21 gratis</em></ins></span> Android <span 
class="removed"><del><strong>VPN</strong></del></span> <span 
class="inserted"><ins><em>antivirus</em></ins></span> apps <span 
class="removed"><del><strong>concluded</strong></del></span>
-    that <span class="removed"><del><strong>&ldquo;in 
spite</strong></del></span> <span class="inserted"><ins><em>were tested by 
security researchers, eight &lt;a
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
-    failed to detect a test virus&lt;/a&gt;. All</em></ins></span> of <span 
class="removed"><del><strong>the
-    promises</strong></del></span> <span class="inserted"><ins><em>them 
asked</em></ins></span> for <span class="removed"><del><strong>privacy, 
security, and anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>dangerous
+    failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
     permissions or contained advertising trackers, with seven being more
-    risky than</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN 
apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>average</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely 
subject</strong></del></span> <span class="inserted"><ins><em>the 100 most 
popular Android apps.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that the article refers</em></ins></span> to 
<span class="removed"><del><strong>poor security guarantees and abusive 
practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
-  &lt;p&gt;Following is a non-exhaustive list of</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>VPN</strong></del></span> apps <span 
class="removed"><del><strong>from
-    the research paper that tracks</strong></del></span> <span 
class="inserted"><ins><em>as
+    &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -476,14 +433,11 @@
   &lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri, Alexa,</em></ins></span> and <span 
class="removed"><del><strong>infringes</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>privacy of
-    users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;</strong></del></span> <span 
class="inserted"><ins><em>other voice-control systems can be &lt;a
-    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked by programs that play commands in ultrasound that humans
-    can't hear&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Siri,</em></ins></span> Alexa, and all the other voice-control 
systems can be &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+    hijacked</em></ins></span> by programs that play commands in ultrasound 
that humans
+    can't <span class="removed"><del><strong>hear&lt;/a&gt;.
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807020"&gt;
@@ -491,19 +445,23 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
+    photos to people in the owner's contact 
list&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
     can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
     Broadcom's non-free firmware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703070"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The CIA exploited existing vulnerabilities
@@ -529,28 +487,51 @@
 
   &lt;li id="M201701270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;Samsung phones &lt;a
     
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
     a security hole that allows an SMS message to install
     ransomware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201701130"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However, the worse aspect of these apps is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;WhatsApp has a feature that &lt;a
-    
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
-    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
+    &lt;p&gt;WhatsApp has a feature</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data in smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail 
here,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
+    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; 
because</em></ins></span> it <span 
class="removed"><del><strong>seems</strong></del></span> <span 
class="inserted"><ins><em>would
     enable governments to nullify its encryption.&lt;/p&gt;
 
-    &lt;p&gt;The developers say that it wasn't intended as a back door, and 
that
-    may well be true. But that leaves the crucial question of whether it
-    functions as one. Because the program is nonfree, we cannot check by
-    studying it.&lt;/p&gt;
+    &lt;p&gt;The developers say</em></ins></span> that <span 
class="removed"><del><strong>this
+  does not operate via the universal</strong></del></span> <span 
class="inserted"><ins><em>it wasn't intended as a</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>door, and</em></ins></span> that <span 
class="removed"><del><strong>we know nearly all
+  portable phones have. It</strong></del></span>
+    may <span class="removed"><del><strong>involve exploiting various bugs. 
There are
+   &lt;a href="#universal-back-door"&gt;
+  lots</strong></del></span> <span class="inserted"><ins><em>well be true. But 
that leaves the crucial question</em></ins></span> of <span 
class="removed"><del><strong>bugs in</strong></del></span> <span 
class="inserted"><ins><em>whether it
+    functions as one. Because</em></ins></span> the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>program is nonfree, we cannot check by
+    studying it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201607290"&gt;
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; 
in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -564,22 +545,28 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A half-blind security critique of a tracking app: it found that 
&lt;a
     
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-    blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
-    The critique fails entirely to express concern that the app sends the
-    personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
+    blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span 
class="removed"><del><strong>address
+      book</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;.
+    The critique fails entirely</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>express concern</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> the 
<span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>app 
sends the
+    personal data</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
server, where the &lt;em&gt;developer&lt;/em&gt; gets it all.
     This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
     &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely
-    it is worthless since nearly all of them are.&lt;/p&gt;
+    it is worthless since nearly all of them are.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201607190"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some 
portable</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A bug in a proprietary ASN.1 library, used
-    in cell phone towers as well as cell phones and routers, &lt;a
-    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
-    taking control of those systems&lt;/a&gt;.&lt;/p&gt;
+    in cell phone towers as well as cell</em></ins></span> phones <span 
class="inserted"><ins><em>and routers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+    taking control</em></ins></span> of <span class="inserted"><ins><em>those 
systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603100"&gt;
@@ -587,9 +574,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary payment apps &lt;a
     
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
-    personal data in an insecure way&lt;/a&gt;. However,
-    the worse aspect of these apps is that &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
+    personal</em></ins></span> data <span class="removed"><del><strong>to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>in an insecure way&lt;/a&gt;. 
However,</em></ins></span>
+    the <span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not
     anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -599,24 +589,34 @@
     &lt;p&gt;&lt;a
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
-    your personal data on remote servers&lt;/a&gt;. This leaves personal
+    your personal data</em></ins></span> on <span 
class="removed"><del><strong>what people</strong></del></span> <span 
class="inserted"><ins><em>remote servers&lt;/a&gt;. This leaves personal
     information like email addresses, passwords, and health information
-    vulnerable. Because many of these apps are proprietary it makes it
-    hard to impossible to know which apps are at risk.&lt;/p&gt;
+    vulnerable. Because many of these apps</em></ins></span> are <span 
class="removed"><del><strong>listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>proprietary</em></ins></span> it <span 
class="removed"><del><strong>may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>makes it
+    hard</em></ins></span> to <span class="removed"><del><strong>serve them 
with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>impossible to know which apps are at 
risk.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405190"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
-    (access to personal data) by storing users' data on a special server &lt;a
-    
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
-    deactivated by its developer&lt;/a&gt; which had discovered a security
-    flaw.&lt;/p&gt;
+    (access to personal data) by storing users' data on a special 
server</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy 
and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
+    deactivated by its developer&lt;/a&gt; which had discovered 
a</em></ins></span> security
+    <span class="removed"><del><strong>of 283 Android VPN apps 
concluded</strong></del></span>
+    <span class="inserted"><ins><em>flaw.&lt;/p&gt;
 
     &lt;p&gt;That developer seems to be conscientious about protecting personal
-    data from third parties in general, but it can't protect that data
-    from the state.  Quite the contrary: confiding your data to someone
+    data from third parties in general, but it can't protect</em></ins></span> 
that <span class="removed"><del><strong>&ldquo;in spite 
of</strong></del></span> <span class="inserted"><ins><em>data
+    from</em></ins></span> the
+    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span class="inserted"><ins><em>state. 
 Quite</em></ins></span> the
+    <span class="removed"><del><strong>majority of</strong></del></span> <span 
class="inserted"><ins><em>contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your rights.&lt;/p&gt;
   &lt;/li&gt;
@@ -1294,16 +1294,20 @@
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
+    for privacy, security, and anonymity given by the majority 
of</em></ins></span> VPN
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
+    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;</em></ins></span>
+    &lt;dl class="compact"&gt;</em></ins></span>
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
 
@@ -1390,74 +1394,75 @@
                &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
                how much access</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. In addition,</em></ins></span>
-    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>personal 
data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
+  &lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A pregnancy test controller application not 
only</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal data
-       to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of</em></ins></span> data in the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+ &lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps</strong></del></span> <span 
class="inserted"><ins><em>phone, and in server accounts,
+    it</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal data
+       to servers.</strong></del></span> <span class="inserted"><ins><em>alter 
them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
+  &lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
-to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated to the app's functionality, was</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>personal 
details of users</strong></del></span> <span class="inserted"><ins><em>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
+    &lt;p&gt;The article should not have described these apps as
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is</em></ins></span> that <span 
class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
-    analyze</em></ins></span> what <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>usual analytics 
tools are
+    legitimate, but</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most</strong></del></span>
+    <span class="inserted"><ins><em>analyze what</em></ins></span> users <span 
class="removed"><del><strong>have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>are doing or how.  &ldquo;Analytics&rdquo; 
tools</em></ins></span>
+    that <span class="removed"><del><strong>spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
 and honestly identify the information it collects on users, instead
 of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
 &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in the first
+and</strong></del></span> <span class="inserted"><ins><em>just as wrong as 
any</em></ins></span> other <span class="removed"><del><strong>companies from 
getting this personal information in the first
 place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1854,7 +1859,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/31 17:33:51 $
+$Date: 2021/02/01 11:02:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary/po/malware-mobiles.de.po        31 Jan 2021 17:33:51 -0000      
1.152
+++ proprietary/po/malware-mobiles.de.po        1 Feb 2021 11:02:26 -0000       
1.153
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -171,6 +171,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -194,91 +211,6 @@
 "USA und der EU), dass das Netz alle Standortdaten für Monate oder Jahre "
 "speichert."
 
-# "Ein Mobiltelefon kann in ein Mikrofon und Sender umgewandelt werden, um
-#  Gespräche in der Nähe des Telefons abzuhören."
-# --Sicherheitsbüro des US-Handelsministeriums
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> often used to make a phone transmit all "
-"conversations it hears</a>."
-msgstr ""
-"Fast jeder Telefon-Kommunikationsprozessor hat eine universelle Hintertür, "
-"der <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\" title=\"Remotely Eavesdropping on Cell Phone "
-"Microphones, in:  Schneier on Security 2006.\">oft dazu verwendet wird alle "
-"Gespräche <ins>in der Nähe des Telefons</ins> abzuhören und zu 
übertragen</"
-"a>."
-
-#. type: Content of: <div><div><div><ul><li><p>
-# | The back door <a {+class=\"not-a-duplicate\"+}
-# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
-# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
-# | to leave the security holes in place is morally equivalent to writing a
-# | back door.
-#, fuzzy
-#| msgid ""
-#| "The back door <a href=\"http://www.osnews.com/story/27416/";
-#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-#| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
-#| "the security holes in place is morally equivalent to writing a back door."
-msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
-"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
-"leave the security holes in place is morally equivalent to writing a back "
-"door."
-msgstr ""
-"Die Hintertür <a href=\"https://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\" title=\"The "
-"second operating system hiding in every mobile phone, unter: https://www.";
-"osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone, OSNews 2017."
-"\">kann die Form von Programmfehlern haben, die 20 Jahre ungefixt blieben</"
-"a>. Die Entscheidung, die Sicherheitslücken zu belassen, ist moralisch "
-"gleichbedeutend mit dem Schreiben einer Hintertür."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
-msgstr ""
-"Die Hintertür befindet sich im „Modem-Prozessor“, dessen Aufgabe es ist 
mit "
-"dem Funknetz zu kommunizieren. Bei den meisten Telefonen steuert der Modem-"
-"Prozessor das Mikrofon. In den meisten Fällen ist es auch möglich die "
-"Software für den Hauptprozessor neu zu schreiben."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
-msgstr ""
-"Einige Telefonmodelle sind gezielt so konzipiert, dass der Modem-Prozessor "
-"nicht das Mikrofon steuert und somit nicht die Software im Hauptprozessor "
-"ändern kann. Sie haben zwar immer noch die Hintertür, aber zumindest ist es 
"
-"nicht möglich das Telefon zu einem Abhörgerät umzubiegen."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The universal back door is apparently also used to make phones <a href="
-"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
-msgstr ""
-"Die universelle Hintertür wird offenbar auch dazu genutzt um Telefone, <a "
-"href=\"//www.slate.com/blogs/future_tense/2013/07/22/"
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\" "
-"title=\"NSA Can Reportedly Track Phones Even When They're Turned Off, unter: "
-"slate.com 2013.\">selbst wenn sie ausgeschaltet sind, übertragen zu lassen</"
-"a>. Das bedeutet, deren Bewegungen werden nachverfolgt und möglicherweise "
-"funktioniert das Abhören auch."
-
 #. type: Content of: <div><div><div><h3>
 # | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
 #, fuzzy
@@ -370,24 +302,90 @@
 msgid "Back Doors"
 msgstr "Hintertüren in Smartphones"
 
+# "Ein Mobiltelefon kann in ein Mikrofon und Sender umgewandelt werden, um
+#  Gespräche in der Nähe des Telefons abzuhören."
+# --Sicherheitsbüro des US-Handelsministeriums
 #. type: Content of: <div><div><p>
-# | See above for the <a [-href=\"#universal-back-door\">general-]
-# | {+href=\"#universal-back-door-phone-modem\">general+} universal back
-# | door</a> in essentially all mobile phones, which permits converting them
-# | into full-time listening devices.
+msgid ""
+"Almost every phone's communication processor has a universal back door which "
+"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> often used to make a phone transmit all "
+"conversations it hears</a>."
+msgstr ""
+"Fast jeder Telefon-Kommunikationsprozessor hat eine universelle Hintertür, "
+"der <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\" title=\"Remotely Eavesdropping on Cell Phone "
+"Microphones, in:  Schneier on Security 2006.\">oft dazu verwendet wird alle "
+"Gespräche <ins>in der Nähe des Telefons</ins> abzuhören und zu 
übertragen</"
+"a>."
+
+#. type: Content of: <div><div><p>
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
 #, fuzzy
 #| msgid ""
-#| "See above for the <a href=\"#universal-back-door\">general universal back "
-#| "door</a> in essentially all mobile phones, which permits converting them "
-#| "into full-time listening devices."
+#| "The back door <a href=\"http://www.osnews.com/story/27416/";
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
-"Siehe oben für die in praktisch allen Mobiltelefonen vorhandene <a href="
-"\"#universal-back-door\">allgemeine universelle Hintertür</a>, die es "
-"ermöglicht, sie in Vollzeit-Abhörgeräte umzuschalten."
+"Die Hintertür <a href=\"https://www.osnews.com/story/27416/";
+"The_second_operating_system_hiding_in_every_mobile_phone\" title=\"The "
+"second operating system hiding in every mobile phone, unter: https://www.";
+"osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone, OSNews 2017."
+"\">kann die Form von Programmfehlern haben, die 20 Jahre ungefixt blieben</"
+"a>. Die Entscheidung, die Sicherheitslücken zu belassen, ist moralisch "
+"gleichbedeutend mit dem Schreiben einer Hintertür."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+"Die Hintertür befindet sich im „Modem-Prozessor“, dessen Aufgabe es ist 
mit "
+"dem Funknetz zu kommunizieren. Bei den meisten Telefonen steuert der Modem-"
+"Prozessor das Mikrofon. In den meisten Fällen ist es auch möglich die "
+"Software für den Hauptprozessor neu zu schreiben."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+"Einige Telefonmodelle sind gezielt so konzipiert, dass der Modem-Prozessor "
+"nicht das Mikrofon steuert und somit nicht die Software im Hauptprozessor "
+"ändern kann. Sie haben zwar immer noch die Hintertür, aber zumindest ist es 
"
+"nicht möglich das Telefon zu einem Abhörgerät umzubiegen."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The universal back door is apparently also used to make phones <a href="
+"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
+msgstr ""
+"Die universelle Hintertür wird offenbar auch dazu genutzt um Telefone, <a "
+"href=\"//www.slate.com/blogs/future_tense/2013/07/22/"
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\" "
+"title=\"NSA Can Reportedly Track Phones Even When They're Turned Off, unter: "
+"slate.com 2013.\">selbst wenn sie ausgeschaltet sind, übertragen zu lassen</"
+"a>. Das bedeutet, deren Bewegungen werden nachverfolgt und möglicherweise "
+"funktioniert das Abhören auch."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2772,6 +2770,20 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "See above for the <a href=\"#universal-back-door\">general universal "
+#~| "back door</a> in essentially all mobile phones, which permits converting "
+#~| "them into full-time listening devices."
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Siehe oben für die in praktisch allen Mobiltelefonen vorhandene <a href="
+#~ "\"#universal-back-door\">allgemeine universelle Hintertür</a>, die es "
+#~ "ermöglicht, sie in Vollzeit-Abhörgeräte umzuschalten."
+
+#, fuzzy
+#~| msgid ""
 #~| "Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
 #~| "Inc."
 #~ msgid ""

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary/po/malware-mobiles.es.po        31 Jan 2021 17:33:51 -0000      
1.219
+++ proprietary/po/malware-mobiles.es.po        1 Feb 2021 11:02:26 -0000       
1.220
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -127,6 +127,23 @@
 msgid "Cell-phone communications"
 msgstr "Comunicaciones a través del móvil"
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -147,72 +164,6 @@
 "registre su ubicación. Muchos países (incluidos EE.&nbsp;UU. y la UE) 
exigen "
 "que la red guarde los datos de esas ubicaciones durante meses o años."
 
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> often used to make a phone transmit all "
-"conversations it hears</a>."
-msgstr ""
-"El procesador de comunicaciones de casi todos los teléfonos tiene una puerta 
"
-"trasera universal que <a href=\"https://www.schneier.com/blog/";
-"archives/2006/12/remotely_eavesd_1.html\">a menudo se utiliza para hacer que "
-"el teléfono transmita todas las conversaciones que escucha</a>."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
-"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
-"leave the security holes in place is morally equivalent to writing a back "
-"door."
-msgstr ""
-"La puerta trasera <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
-"puede producirse en forma de fallos que han permanecido veinte años sin "
-"corregirse</a>. La decisión de dejar esos agujeros de seguridad es desde el "
-"punto de vista ético equivalente a colocar una puerta trasera."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
-msgstr ""
-"La puerta trasera se encuentra en el «procesador del módem», cuyo cometido 
"
-"es comunicarse con la red radiofónica. En la mayoría de los teléfonos, el "
-"procesador del módem controla el micrófono. En la mayoría de los 
teléfonos "
-"tiene, además, la capacidad de reescribir el software del procesador "
-"principal."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
-msgstr ""
-"Unos pocos modelos de teléfonos están especialmente diseñados para que el "
-"procesador del módem no controle el micrófono ni pueda modificar el 
software "
-"del procesador principal. Siguen teniendo la puerta trasera, pero al menos "
-"no es capaz de convertir el teléfono en un dispositivo de escucha."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The universal back door is apparently also used to make phones <a href="
-"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
-msgstr ""
-"Al parecer, la puerta trasera universal se utiliza también para hacer que "
-"los teléfonos <a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
-"\">transmitan incluso cuando están apagados</a>. Esto significa que se "
-"rastrean sus movimientos, y que incluso podría poner en funcionamiento el "
-"sistema de escucha."
-
 #. type: Content of: <div><div><div><h3>
 msgid "Types of malware in mobiles"
 msgstr "Tipos de <cite>malware</cite> en los dispositivos móviles"
@@ -289,14 +240,69 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Vea más arriba acerca de la <a href=\"#universal-back-door-phone-modem"
-"\">puerta trasera universal general</a> presente en prácticamente todos los "
-"teléfonos móviles, lo que permite convertirlos en dispositivos de escucha a 
"
-"tiempo completo."
+"Almost every phone's communication processor has a universal back door which "
+"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> often used to make a phone transmit all "
+"conversations it hears</a>."
+msgstr ""
+"El procesador de comunicaciones de casi todos los teléfonos tiene una puerta 
"
+"trasera universal que <a href=\"https://www.schneier.com/blog/";
+"archives/2006/12/remotely_eavesd_1.html\">a menudo se utiliza para hacer que "
+"el teléfono transmita todas las conversaciones que escucha</a>."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
+msgstr ""
+"La puerta trasera <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+"puede producirse en forma de fallos que han permanecido veinte años sin "
+"corregirse</a>. La decisión de dejar esos agujeros de seguridad es desde el "
+"punto de vista ético equivalente a colocar una puerta trasera."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+"La puerta trasera se encuentra en el «procesador del módem», cuyo cometido 
"
+"es comunicarse con la red radiofónica. En la mayoría de los teléfonos, el "
+"procesador del módem controla el micrófono. En la mayoría de los 
teléfonos "
+"tiene, además, la capacidad de reescribir el software del procesador "
+"principal."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+"Unos pocos modelos de teléfonos están especialmente diseñados para que el "
+"procesador del módem no controle el micrófono ni pueda modificar el 
software "
+"del procesador principal. Siguen teniendo la puerta trasera, pero al menos "
+"no es capaz de convertir el teléfono en un dispositivo de escucha."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The universal back door is apparently also used to make phones <a href="
+"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
+msgstr ""
+"Al parecer, la puerta trasera universal se utiliza también para hacer que "
+"los teléfonos <a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
+"\">transmitan incluso cuando están apagados</a>. Esto significa que se "
+"rastrean sus movimientos, y que incluso podría poner en funcionamiento el "
+"sistema de escucha."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2469,3 +2475,13 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Vea más arriba acerca de la <a href=\"#universal-back-door-phone-modem"
+#~ "\">puerta trasera universal general</a> presente en prácticamente todos "
+#~ "los teléfonos móviles, lo que permite convertirlos en dispositivos de "
+#~ "escucha a tiempo completo."

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary/po/malware-mobiles.fr.po        31 Jan 2021 18:31:42 -0000      
1.232
+++ proprietary/po/malware-mobiles.fr.po        1 Feb 2021 11:02:26 -0000       
1.233
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: 2021-01-31 19:09+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -122,6 +123,23 @@
 msgid "Cell-phone communications"
 msgstr "Téléphonie mobile"
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -143,72 +161,6 @@
 "Unis et l'Union européenne) exigent que le réseau conserve toutes ces "
 "données de localisation pendant des mois ou des années."
 
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> often used to make a phone transmit all "
-"conversations it hears</a>."
-msgstr ""
-"Le processeur de communication de chaque téléphone a une porte dérobée "
-"universelle qui est <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\">souvent utilisée pour forcer le téléphone à "
-"transmettre toutes les conversations qu'il entend</a>."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
-"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
-"leave the security holes in place is morally equivalent to writing a back "
-"door."
-msgstr ""
-"Cette porte dérobée <a class=\"not-a-duplicate\" href=\"http://www.osnews.";
-"com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
-"\">peut prendre la forme de bogues qui sont restés non corrigés pendant "
-"20 ans</a>. Le choix de laisser ces failles de sécurité en place est "
-"l'équivalent moral de la création d'une porte dérobée."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
-msgstr ""
-"La porte dérobée est dans le « processeur du modem », dont le rôle est 
de "
-"communiquer avec le réseau hertzien. Dans la plupart des téléphones, le "
-"processeur du modem a le contrôle du micro et en général il a aussi la "
-"capacité de réécrire le logiciel du processeur principal."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
-msgstr ""
-"Quelques modèles de téléphone sont spécialement conçus pour que le "
-"processeur du modem ne contrôle pas le micro et par conséquent ne puisse 
pas "
-"changer le logiciel du processeur principal. Ils ont tout de même une porte "
-"dérobée, mais au moins elle est incapable de transformer le téléphone en "
-"appareil d'écoute."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The universal back door is apparently also used to make phones <a href="
-"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
-msgstr ""
-"Il semble que la porte dérobée universelle soit également utilisée pour "
-"forcer les téléphones à <a href=\"http://www.slate.com/blogs/";
-"future_tense/2013/07/22/"
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
-"\">transmettre même quand ils sont éteints</a>. Cela signifie que leurs "
-"mouvements sont suivis et que la fonction d'écoute peut être rendue 
opérante."
-
 #. type: Content of: <div><div><div><h3>
 msgid "Types of malware in mobiles"
 msgstr "Types de malveillance dans les mobiles"
@@ -286,13 +238,69 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Voir plus haut ce qui concerne la <a href=\"#universal-back-door-phone-modem"
-"\">porte dérobée universelle</a>, présente dans presque tous les 
téléphones "
-"mobiles et permettant de les convertir en appareils d'écoute permanente."
+"Almost every phone's communication processor has a universal back door which "
+"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> often used to make a phone transmit all "
+"conversations it hears</a>."
+msgstr ""
+"Le processeur de communication de chaque téléphone a une porte dérobée "
+"universelle qui est <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\">souvent utilisée pour forcer le téléphone à "
+"transmettre toutes les conversations qu'il entend</a>."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
+msgstr ""
+"Cette porte dérobée <a class=\"not-a-duplicate\" href=\"http://www.osnews.";
+"com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+"\">peut prendre la forme de bogues qui sont restés non corrigés pendant "
+"20 ans</a>. Le choix de laisser ces failles de sécurité en place est "
+"l'équivalent moral de la création d'une porte dérobée."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+"La porte dérobée est dans le « processeur du modem », dont le rôle est 
de "
+"communiquer avec le réseau hertzien. Dans la plupart des téléphones, le "
+"processeur du modem a le contrôle du micro et en général il a aussi la "
+"capacité de réécrire le logiciel du processeur principal."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+"Quelques modèles de téléphone sont spécialement conçus pour que le "
+"processeur du modem ne contrôle pas le micro et par conséquent ne puisse 
pas "
+"changer le logiciel du processeur principal. Ils ont tout de même une porte "
+"dérobée, mais au moins elle est incapable de transformer le téléphone en "
+"appareil d'écoute."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The universal back door is apparently also used to make phones <a href="
+"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
+msgstr ""
+"Il semble que la porte dérobée universelle soit également utilisée pour "
+"forcer les téléphones à <a href=\"http://www.slate.com/blogs/";
+"future_tense/2013/07/22/"
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
+"\">transmettre même quand ils sont éteints</a>. Cela signifie que leurs "
+"mouvements sont suivis et que la fonction d'écoute peut être rendue 
opérante."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2445,3 +2453,13 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Voir plus haut ce qui concerne la <a href=\"#universal-back-door-phone-"
+#~ "modem\">porte dérobée universelle</a>, présente dans presque tous les "
+#~ "téléphones mobiles et permettant de les convertir en appareils d'écoute 
"
+#~ "permanente."

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/malware-mobiles.it-diff.html 31 Jan 2021 17:33:51 -0000      
1.103
+++ proprietary/po/malware-mobiles.it-diff.html 1 Feb 2021 11:02:26 -0000       
1.104
@@ -153,98 +153,84 @@
 &lt;div class="frame"&gt;
 &lt;h3 id="phone-communications"&gt;Cell-phone communications&lt;/h3&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201502100"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The phone network &lt;a
-    href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
-    tracks</em></ins></span> the <span class="removed"><del><strong>data 
stored on</strong></del></span> <span class="inserted"><ins><em>movements of 
each phone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This is inherent in</em></ins></span> the
+&lt;p&gt;This section describes one other malicious characteristic of mobile
+phones, location tracking which is caused by</em></ins></span> the <span 
class="removed"><del><strong>data stored on</strong></del></span> <span 
class="inserted"><ins><em>underlying radio system
+rather than by</em></ins></span> the
   <span class="removed"><del><strong>device.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-  Samsung's back door&lt;/a&gt; provides access</strong></del></span> <span 
class="inserted"><ins><em>design of the phone network: as long as
-    the phone is in communication with the network, there is no 
way</em></ins></span>
-    to <span class="removed"><del><strong>any file on</strong></del></span> 
<span class="inserted"><ins><em>stop</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>network from recording its location.  Many countries
-    (including the US and the EU) require the network to store all
-    these location data for months or years.&lt;/p&gt;</em></ins></span>
+  Samsung's back door&lt;/a&gt; provides access</strong></del></span> <span 
class="inserted"><ins><em>specific software in them.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is 
configured</em></ins></span> to <span class="removed"><del><strong>any file 
on</strong></del></span> <span class="inserted"><ins><em>report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>questions this raises.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;In Android, &lt;a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google</strong></del></span>
+  &lt;p&gt;In Android,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201311120.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M201502100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="universal-back-door-phone-modem"&gt;
-    Almost every phone's communication processor</em></ins></span> has
-    a <span class="inserted"><ins><em>universal</em></ins></span> back door 
<span class="removed"><del><strong>to remotely delete apps&lt;/a&gt; 
(it</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-    often used to make</em></ins></span> a <span 
class="removed"><del><strong>program
+    &lt;p&gt;The phone network</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door to remotely delete apps&lt;/a&gt; 
(it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+    tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>inherent</em></ins></span> in <span 
class="removed"><del><strong>a program
   called GTalkService).
   &lt;/p&gt;
 
-&lt;p&gt;Google can also</strong></del></span> <span 
class="inserted"><ins><em>phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The back door</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    may take</em></ins></span> the <span class="removed"><del><strong>Wayback 
Machine (archived May 20, 2015)"&gt;forcibly and remotely
-install apps&lt;/a&gt; through GTalkService (which seems, 
since</strong></del></span> <span class="inserted"><ins><em>form of 
bugs</em></ins></span> that <span class="removed"><del><strong>article, 
to</strong></del></span> have
-<span class="removed"><del><strong>been merged into Google Play).  This adds 
up</strong></del></span> <span class="inserted"><ins><em>gone 20 years 
unfixed&lt;/a&gt;.
-    The choice</em></ins></span> to <span class="removed"><del><strong>a 
universal back door. &lt;/p&gt;
+&lt;p&gt;Google can also &lt;a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at</strong></del></span> the <span class="removed"><del><strong>Wayback 
Machine (archived May 20, 2015)"&gt;forcibly and remotely
+install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
+been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
 
   &lt;p&gt;
-  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
-  malicious so far,</strong></del></span> <span 
class="inserted"><ins><em>leave</em></ins></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>security holes in place</em></ins></span> is <span 
class="removed"><del><strong>that nobody should have such power,
-  which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>morally
-    equivalent</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>writing</em></ins></span> a
-  <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
-  considers malicious.  But there</strong></del></span> <span 
class="inserted"><ins><em>back door.&lt;/p&gt;
-
-    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
-    job</em></ins></span> is <span class="removed"><del><strong>no excuse for 
allowing it</strong></del></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>communicate with</em></ins></span> the <span 
class="removed"><del><strong>programs, and you should 
have</strong></del></span> <span class="inserted"><ins><em>radio network.  In 
most phones,</em></ins></span>
-    the <span class="removed"><del><strong>right to
-  decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>modem processor controls the microphone.  In most 
phones it
-    has the power</em></ins></span> to <span 
class="removed"><del><strong>trust in this way.
-  &lt;/p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span> of <span 
class="removed"><del><strong>this power has not been
+  malicious so far,</strong></del></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>phone network: as long as
+    the phone</em></ins></span> is <span class="removed"><del><strong>that 
nobody should have such power,
+  which could also be used maliciously.  You might well decide to let a
+  security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+  considers malicious.  But</strong></del></span> <span 
class="inserted"><ins><em>in communication with the network,</em></ins></span> 
there is no <span class="removed"><del><strong>excuse for allowing 
it</strong></del></span> <span class="inserted"><ins><em>way</em></ins></span>
+    to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>stop the network from recording its location.  
Many countries
+    (including</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>US</em></ins></span> and <span 
class="removed"><del><strong>you should have</strong></del></span> the <span 
class="removed"><del><strong>right to
+  decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>EU) require the network</em></ins></span> to <span 
class="removed"><del><strong>trust in this way.
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>store all
+    these location data for months or years.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
-
-&lt;p&gt;These bugs are/were not intentional, so unlike</strong></del></span> 
<span class="inserted"><ins><em>rewrite</em></ins></span> the <span 
class="removed"><del><strong>rest of</strong></del></span> <span 
class="inserted"><ins><em>software for</em></ins></span> the <span 
class="removed"><del><strong>file
-  they do</strong></del></span> <span class="inserted"><ins><em>main processor
-    too.&lt;/p&gt;
-
-    &lt;p&gt;A few phone models are specially designed so that the modem
-    processor does</em></ins></span> not <span 
class="removed"><del><strong>count as malware. We mention them to 
refute</strong></del></span> <span 
class="inserted"><ins><em>control</em></ins></span> the
-  <span class="removed"><del><strong>supposition</strong></del></span> <span 
class="inserted"><ins><em>microphone, and so</em></ins></span> that <span 
class="removed"><del><strong>prestigious proprietary</strong></del></span> 
<span class="inserted"><ins><em>it can't
-    change the</em></ins></span> software <span 
class="removed"><del><strong>doesn't</strong></del></span> <span 
class="inserted"><ins><em>in the main processor.  They still</em></ins></span> 
have <span class="removed"><del><strong>grave
-  bugs.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the
-    back door, but at least it is unable to turn the phone unto a
-    listening device.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;h3 id="insecurity"&gt;Mobile 
Insecurity&lt;/h3&gt;
 
-    &lt;p&gt;The universal back door is apparently also used to make phones 
&lt;a
-    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-    transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
-    are tracked, and may also make the listening feature work.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-&lt;/div&gt;
+&lt;p&gt;These bugs are/were not intentional, so unlike the 
rest</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
 &lt;div id="TOC" class="toc-inline"&gt;
-&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;</em></ins></span>
+&lt;h3&gt;Types</em></ins></span> of <span class="removed"><del><strong>the 
file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>malware in mobiles&lt;/h3&gt;</em></ins></span>
 &lt;ul&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Siri, Alexa,</strong></del></span>
+  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
+  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span>
   <span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
@@ -265,81 +251,154 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201604040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;Many <span class="removed"><del><strong>Android 
devices</strong></del></span> <span class="inserted"><ins><em>popular mobile 
games include a random-reward system called</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; 
because</strong></del></span> <span 
class="inserted"><ins><em>href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; 
which is especially effective on
+    children. One variant</em></ins></span> of <span 
class="removed"><del><strong>a bug</strong></del></span> <span 
class="inserted"><ins><em>gacha was declared illegal</em></ins></span> in
+       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung
+phones</strong></del></span> <span class="inserted"><ins><em>Japan in 2012,
+    but the other variants are still</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole that allows an SMS message to install
+ransomware&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
     luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
+    money on virtual toys.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
 
-    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general universal back
-    door&lt;/a&gt; in essentially all mobile phones, which permits converting
-    them into full-time listening devices.&lt;/p&gt;
+    &lt;p id="universal-back-door-phone-modem"&gt;
+    Almost every phone's communication processor has
+    a universal back door which is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used to make a phone</em></ins></span> transmit <span 
class="removed"><del><strong>personal data in an insecure way&lt;/a&gt;.
+However,</strong></del></span> <span class="inserted"><ins><em>all 
conversations it hears&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The back door &lt;a class="not-a-duplicate"
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    may take</em></ins></span> the <span class="removed"><del><strong>worse 
aspect</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="removed"><del><strong>these apps is</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> that
+<span class="removed"><del><strong>&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>have gone 20 years 
unfixed&lt;/a&gt;.</em></ins></span>
+    The <span class="removed"><del><strong>NSA can tap 
data</strong></del></span> <span class="inserted"><ins><em>choice to leave the 
security holes</em></ins></span> in <span class="removed"><del><strong>smart 
phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there</strong></del></span> <span 
class="inserted"><ins><em>place</em></ins></span> is <span 
class="removed"><del><strong>not much detail here,</strong></del></span> <span 
class="inserted"><ins><em>morally
+    equivalent to writing a back door.&lt;/p&gt;
+
+    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
+    job is to communicate with the radio network.  In most phones,
+    the modem processor controls the microphone.  In most 
phones</em></ins></span> it <span 
class="removed"><del><strong>seems</strong></del></span>
+    <span class="inserted"><ins><em>has the power to rewrite the software for 
the main processor
+    too.&lt;/p&gt;
+
+    &lt;p&gt;A few phone models are specially designed so</em></ins></span> 
that <span class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>the modem
+    processor</em></ins></span> does not <span 
class="removed"><del><strong>operate via</strong></del></span> <span 
class="inserted"><ins><em>control the microphone, and so that it can't
+    change the software in the main processor.  They still have the
+    back door, but at least it is unable to turn</em></ins></span> the <span 
class="inserted"><ins><em>phone unto a
+    listening device.&lt;/p&gt;
+
+    &lt;p&gt;The</em></ins></span> universal back door <span 
class="removed"><del><strong>that we know nearly all
+  portable</strong></del></span> <span class="inserted"><ins><em>is apparently 
also used to make</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots of bugs in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+    transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
+    are tracked, and may also make</em></ins></span> the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span> <span 
class="inserted"><ins><em>listening feature work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202001090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
-    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
-    preinstalled adware and a back door for forcing installation of
+    &lt;p&gt;Android phones subsidized by the US government come 
with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>a back door for forcing installation of
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The adware is in a modified version of an
+    &lt;p&gt;The adware is</em></ins></span> in <span 
class="removed"><del><strong>user's address
+      book</strong></del></span> <span class="inserted"><ins><em>a modified 
version of an
     essential system configuration app. The back door is a
-    surreptitious addition to a program whose stated purpose is to be a &lt;a
-    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note that this article 
misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>a 
program whose stated purpose is</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>be a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
     universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In other words, a program whose raison d'être is malicious has
-    a secret secondary malicious purpose. All this is in addition to the
+    a secret secondary malicious purpose. All this is in 
addition</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's</strong></del></span> <span class="inserted"><ins><em>the
     malware of Android itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very popular app found in the
-    Google Play store contained a module that was designed to &lt;a
-    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install malware on the user's computer&lt;/a&gt;. The app developers
+    &lt;p&gt;A very popular</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>found in</em></ins></span> the <span 
class="removed"><del><strong>time,</strong></del></span>
+    <span class="inserted"><ins><em>Google Play store contained a module that 
was designed to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
+    install malware</em></ins></span> on <span class="inserted"><ins><em>the 
user's computer&lt;/a&gt;. The app developers
     regularly used it to make the computer download and execute any code
     they wanted.&lt;/p&gt;
 
-    &lt;p&gt;This is a concrete example of what users are exposed to when they
-    run nonfree apps. They can never be completely sure that a nonfree
-    app is safe.&lt;/p&gt;
+    &lt;p&gt;This is a concrete example of</em></ins></span> what <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>listening</strong></del></span> <span 
class="inserted"><ins><em>exposed</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> <span class="inserted"><ins><em>when they
+    run nonfree apps. They can never</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's conversations to serve them 
with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>completely sure that a nonfree
+    app is safe.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609130"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
+    &lt;p&gt;Xiaomi phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"&gt;
     a universal back door in the application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
+    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>investigated</strong></del></span> the <span 
class="removed"><del><strong>privacy and security
+    of 283</strong></del></span> <span class="inserted"><ins><em>local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="removed"><del><strong>VPN apps concluded</strong></del></span> <span 
class="inserted"><ins><em>library, Moplus, has a back door</em></ins></span> 
that <span class="removed"><del><strong>&ldquo;in spite of the
+    promises for privacy, security, and anonymity given</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It is used</em></ins></span> by <span 
class="removed"><del><strong>the
+    majority of VPN apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412180"&gt;
@@ -347,9 +406,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
-    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
+    A Chinese version</em></ins></span> of <span 
class="removed"><del><strong>users may be unawarely subject
+    to poor security guarantees and abusive practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is</strong></del></span> <span 
class="inserted"><ins><em>Android has</em></ins></span> a <span 
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt;. Nearly
+    all models</em></ins></span> of <span 
class="removed"><del><strong>proprietary VPN apps from</strong></del></span> 
<span class="inserted"><ins><em>mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
+    universal back door in</em></ins></span> the <span 
class="removed"><del><strong>research paper</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -359,7 +422,13 @@
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
     Samsung Galaxy devices running proprietary Android versions come with
-    a back door&lt;/a&gt; that provides remote access to the files stored on
+    a back door&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant</strong></del></span> <span class="inserted"><ins><em>provides 
remote access</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>the files stored on
     the device.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -371,15 +440,30 @@
   &lt;li id="M202002020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then &lt;a
+    &lt;p&gt;Many Android apps fool their</em></ins></span> users <span 
class="removed"><del><strong>and show</strong></del></span> <span 
class="inserted"><ins><em>by asking</em></ins></span>
+    them <span class="removed"><del><strong>targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;</strong></del></span> <span 
class="inserted"><ins><em>to decide what</em></ins></span> permissions <span 
class="removed"><del><strong>upon installation, meaning it has full 
access</strong></del></span> to
+      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps</strong></del></span> <span 
class="inserted"><ins><em>program,</em></ins></span> and <span 
class="removed"><del><strong>also core</strong></del></span> <span 
class="inserted"><ins><em>then &lt;a
     
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/"&gt;
     bypassing these permissions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The Android system is supposed to prevent data leaks by running 
apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are 
nonfree.&lt;/p&gt;
+    &lt;p&gt;The Android</em></ins></span> system <span 
class="removed"><del><strong>logs. TigerVPN</strong></del></span> <span 
class="inserted"><ins><em>is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but</em></ins></span> developers have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>found ways</em></ins></span> to <span 
class="removed"><del><strong>LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>access the
+    data by other means,</em></ins></span> and <span 
class="removed"><del><strong>may turn them over</strong></del></span> <span 
class="inserted"><ins><em>there is nothing the user can do</em></ins></span> to 
<span class="inserted"><ins><em>stop
+    them from doing so, since both</em></ins></span> the <span 
class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into</strong></del></span> <span 
class="inserted"><ins><em>system and</em></ins></span> the <span 
class="removed"><del><strong>HTML pages returned</strong></del></span> <span 
class="inserted"><ins><em>apps are nonfree.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -387,7 +471,8 @@
 &lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
 
 &lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
-functionalities designed to restrict what users can do with the data
+functionalities designed</em></ins></span> to <span 
class="inserted"><ins><em>restrict what users can do with</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>data
 in their computers.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -396,70 +481,117 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
-    Netflix uses to enforce the geolocation restrictions dictated by the
-    movie studios.&lt;/p&gt;
+    forces</em></ins></span> the <span class="removed"><del><strong>JS 
injection</strong></del></span> <span class="inserted"><ins><em>use of Google 
DNS&lt;/a&gt;. This</em></ins></span> is <span class="inserted"><ins><em>one of 
the methods that
+    Netflix uses</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span 
class="inserted"><ins><em>enforce</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>geolocation restrictions dictated 
by</em></ins></span> the <span class="removed"><del><strong>non-premium 
version</strong></del></span>
+    <span class="inserted"><ins><em>movie studios.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+&lt;p&gt;These bugs are/were not intentional, so unlike the 
rest</em></ins></span> of the <span class="removed"><del><strong>app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found</strong></del></span> <span 
class="inserted"><ins><em>file
   they do not count as malware. We mention them to refute the
-  supposition that prestigious proprietary software doesn't have grave
+  supposition</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201908020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested by security researchers, eight &lt;a
+    &lt;p&gt;Out</em></ins></span> of <span class="removed"><del><strong>the 
top-ranked</strong></del></span> <span 
class="inserted"><ins><em>21</em></ins></span> gratis
+  <span class="removed"><del><strong>proprietary</strong></del></span> Android 
<span class="inserted"><ins><em>antivirus</em></ins></span> apps
+    <span class="inserted"><ins><em>that were tested by security researchers, 
eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
     failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
-    permissions or contained advertising trackers, with seven being more
+    permissions or</em></ins></span> contained <span 
class="removed"><del><strong>recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>advertising trackers, 
with seven being more
     risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps as
-    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
-    instead.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The</strong></del></span> article <span 
class="removed"><del><strong>confusingly describes gratis</strong></del></span> 
<span class="inserted"><ins><em>refers to these proprietary</em></ins></span> 
apps as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;free&rdquo;.</em></ins></span> It 
<span class="removed"><del><strong>also uses the ugly word 
&ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>should have said &ldquo;gratis&rdquo;
+    instead.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807100"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
-    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked by programs that play commands in ultrasound that humans
-    can't hear&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can 
be</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or 
played</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+    hijacked</em></ins></span> by <span class="removed"><del><strong>TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>programs that play commands in ultrasound that humans
+    can't hear&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807020"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Samsung phones randomly &lt;a
-    
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some Samsung phones randomly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
+    photos</em></ins></span> to <span class="removed"><del><strong>personal 
data</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> in the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>owner's contact 
list&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android devices &lt;a
-    
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-    can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
-    Broadcom's non-free firmware.&lt;/p&gt;
+    &lt;p&gt;Many</em></ins></span> Android <span 
class="removed"><del><strong>apps can collude to transmit users' personal data
+       to servers.</strong></del></span> <span 
class="inserted"><ins><em>devices</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+    can be hijacked through their Wi-Fi chips&lt;/a&gt; 
because</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a bug in
+    Broadcom's non-free firmware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703070"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The CIA exploited existing vulnerabilities
-    in &ldquo;smart&rdquo; TVs and phones to design a malware that &lt;a
+    in &ldquo;smart&rdquo; TVs</em></ins></span> and <span 
class="removed"><del><strong>Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>phones to design a malware</em></ins></span> that 
<span class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"&gt;
-    spies through their microphones and cameras while making them appear
-    to be turned off&lt;/a&gt;. Since the spyware sniffs signals, it bypasses
+    spies through their microphones</em></ins></span> and <span 
class="removed"><del><strong>honestly identify</strong></del></span> <span 
class="inserted"><ins><em>cameras while making them appear
+    to be turned off&lt;/a&gt;. Since</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>spyware sniffs 
signals,</em></ins></span> it <span class="inserted"><ins><em>bypasses
     encryption.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -470,36 +602,69 @@
     
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
     a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is in addition to the fact that the car contains a cellular
-    modem that tells big brother all the time where it is.  If you own
-    such a car, it would be wise to disconnect the modem so as to turn
-    off the tracking.&lt;/p&gt;
+    &lt;p&gt;This is</em></ins></span> in <span 
class="removed"><del><strong>an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
+and other companies from getting this personal information 
in</strong></del></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Google Play (a component of Android) &lt;a
+  
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+  tracks</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> the <span class="removed"><del><strong>users' movements 
without their permission&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Even if you disable Google Maps and location 
tracking,</strong></del></span> <span class="inserted"><ins><em>car contains a 
cellular
+    modem that tells big brother all the time where it is.  
If</em></ins></span> you <span class="removed"><del><strong>must
+  disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>own
+    such a car, it would be wise</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
+  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>modem so as</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>turn
+    off</em></ins></span> the <span class="removed"><del><strong>user,
+  when it's actually doing something else.  Such a thing would be almost
+  unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
 
-  &lt;li id="M201701270"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201701270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Samsung phones &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
-    a security hole that allows an SMS message to install
+    &lt;p&gt;Samsung phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+    a security hole that allows</em></ins></span> an <span 
class="removed"><del><strong>opt-in proprietary search 
app</strong></del></span> <span class="inserted"><ins><em>SMS message to install
     ransomware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;WhatsApp has a feature that &lt;a
+    &lt;p&gt;WhatsApp has a feature</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
     
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
-    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
-    enable governments to nullify its encryption.&lt;/p&gt;
+    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; 
because</em></ins></span> it <span class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some of</strong></del></span> <span 
class="inserted"><ins><em>would
+    enable governments to nullify</em></ins></span> its <span 
class="removed"><del><strong>phones. The app will give Verizon the same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>encryption.&lt;/p&gt;
+
+    &lt;p&gt;The developers say</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-    &lt;p&gt;The developers say that it wasn't intended as a back door, and 
that
-    may well be true. But that leaves the crucial question of whether it
-    functions as one. Because the program is nonfree, we cannot check by
-    studying it.&lt;/p&gt;
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>it wasn't intended as a back 
door,</em></ins></span> and <span class="inserted"><ins><em>that
+    may well be true. But that leaves</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span> <span class="inserted"><ins><em>crucial 
question</em></ins></span> of <span 
class="removed"><del><strong>spyware</strong></del></span> <span 
class="inserted"><ins><em>whether it
+    functions as one. Because the program</em></ins></span> is
+    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree, we cannot check by
+    studying it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201607290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -510,7 +675,7 @@
 
   &lt;li id="M201607280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A half-blind security critique of a tracking app: it found that 
&lt;a
     
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
     blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
@@ -522,7 +687,9 @@
     it is worthless since nearly all of them are.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201607190"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A bug in a proprietary ASN.1 library, used
@@ -537,8 +704,9 @@
     &lt;p&gt;Many proprietary payment apps &lt;a
     
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
     personal data in an insecure way&lt;/a&gt;. However,
-    the worse aspect of these apps is that &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
+    the worse aspect of these apps is</em></ins></span> that <span 
class="removed"><del><strong>include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not
     anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -548,9 +716,10 @@
     &lt;p&gt;&lt;a
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
-    your personal data on remote servers&lt;/a&gt;. This leaves personal
-    information like email addresses, passwords, and health information
-    vulnerable. Because many of these apps are proprietary it makes it
+    your personal data</em></ins></span> on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>remote servers&lt;/a&gt;. This leaves personal
+    information like email addresses, passwords,</em></ins></span> and <span 
class="removed"><del><strong>TV programs</strong></del></span> <span 
class="inserted"><ins><em>health information
+    vulnerable. Because many of these apps</em></ins></span> are 
+  <span class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on what 
users post</strong></del></span> <span class="inserted"><ins><em>proprietary it 
makes it
     hard to impossible to know which apps are at risk.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -558,7 +727,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
-    (access to personal data) by storing users' data on a special server &lt;a
+    (access to personal data) by storing users' data</em></ins></span> on 
<span class="removed"><del><strong>various sites such as 
+  Facebook, Google+</strong></del></span> <span class="inserted"><ins><em>a 
special server &lt;a
     
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
     deactivated by its developer&lt;/a&gt; which had discovered a security
     flaw.&lt;/p&gt;
@@ -584,7 +754,7 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    Android,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there is not much
     detail here, it seems that this does not operate via
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
@@ -1132,73 +1302,48 @@
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
-    the <span class="removed"><del><strong>other voice-control 
systems</strong></del></span> <span class="inserted"><ins><em>source code 
somehow to determine whether they mistreat users in
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we</em></ins></span> can <span 
class="removed"><del><strong>be</strong></del></span> <span 
class="inserted"><ins><em>depend on each other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>play 
commands in ultrasound</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope</em></ins></span> that 
<span class="removed"><del><strong>humans can't hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+  &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234</em></ins></span> Android <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>apps that track users by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a 
bug</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed</em></ins></span> in
-       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung
-phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
-a security hole that allows an SMS message</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
+  &lt;li id="M201704260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>install
-ransomware&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Many proprietary payment apps</strong></del></span> <span 
class="inserted"><ins><em>do lots of surveillance, judging by</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to</em></ins></span> personal data in <span 
class="removed"><del><strong>an insecure way&lt;/a&gt;.
-However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps is that
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data in smart phones, including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there is not much detail here, it 
seems</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+  &lt;li id="M201704190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
@@ -1207,38 +1352,18 @@
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that this
-  <span class="removed"><del><strong>does not operate 
via</strong></del></span> <span class="inserted"><ins><em>was done 
without</em></ins></span> the <span class="removed"><del><strong>universal back 
door that we know nearly all
-  portable phones have. It may involve exploiting various bugs. There are
-  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots</strong></del></span> <span class="inserted"><ins><em>users' consent.
-    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>bugs in</strong></del></span> the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Sarahah</strong></del></span> app <span 
class="inserted"><ins><em>said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note that this article misuses</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
-    the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+  &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
-    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1248,15 +1373,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -1267,8 +1391,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1280,15 +1403,12 @@
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+  &lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -1297,15 +1417,11 @@
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
-    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
-    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
-    users:&lt;/p&gt;
-
-  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;</em></ins></span>
+    &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
@@ -1327,14 +1443,13 @@
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display ads. Uses
-      roughly <span class="removed"><del><strong>5</strong></del></span> <span 
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it 
redirects the user's
+      roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
-      <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
-      the non-premium version of the app <span 
class="removed"><del><strong>does
-      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>does JavaScript injection for
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
@@ -1352,91 +1467,55 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>known faces&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span> <span class="inserted"><ins><em>suggests you 
circulate the picture you take according to who is</em></ins></span>
-    in <span class="removed"><del><strong>2015&lt;/a&gt; found that 90% 
of</strong></del></span> the <span class="removed"><del><strong>top-ranked 
gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you circulate the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>pictures are 
likely to be
+    known-faces database, which means the pictures are likely to be
     sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures</em></ins></span> are <span 
class="removed"><del><strong>not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>private 
anymore,
-    even if</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
+  &lt;li id="M201605310"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in 
stores</strong></del></span> or <span class="removed"><del><strong>played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. In addition,</em></ins></span>
-    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>personal 
data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
+  &lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A pregnancy test controller application not 
only</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal data
-       to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+  &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    &lt;p&gt;Apps that include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>post on various sites
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this 
point,</strong></del></span> <span class="inserted"><ins><em>make sure they 
can't &ldquo;fool&rdquo;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
     the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1446,74 +1525,37 @@
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
+    &lt;p&gt;The article should not have described these apps as
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is</em></ins></span> that <span 
class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
-    analyze</em></ins></span> what <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in the first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Google Play (a component</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+  &lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73% and 47%</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for Android and iOS
-    respectively</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-  tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral</em></ins></span> and location <span 
class="removed"><del><strong>tracking, you must
-  disable Google Play itself to completely stop the tracking.  This is
-  yet another example</strong></del></span> <span 
class="inserted"><ins><em>information&lt;/a&gt;</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>their users</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-  when it's actually doing something else.  Such a thing would be almost
-  unthinkable with free software.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>third parties.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
+    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral and location information&lt;/a&gt; of their users to
+    third parties.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+  &lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn</em></ins></span> the <span class="removed"><del><strong>app 
is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
and <span class="inserted"><ins><em>off, listen to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>GPS, take photographs, read
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware</em></ins></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-user data</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;A half-blind security critique of a tracking 
app:</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    read the contact list. This malware is designed to disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1521,22 +1563,16 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 
2015</em></ins></span> it <span class="removed"><del><strong>found 
that</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-blatant flaws allowed anyone</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>snoop on a user's personal data&lt;/a&gt;.
-The critique fails entirely</strong></del></span> <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
-    to <span class="removed"><del><strong>express 
concern</strong></del></span> <span 
class="inserted"><ins><em>realize</em></ins></span> that <span 
class="inserted"><ins><em>it is nasty.&lt;/p&gt;
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>app sends the
-personal data to</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as</em></ins></span> a <span 
class="removed"><del><strong>server, where the &lt;em&gt;developer&lt;/em&gt; 
gets it all.</strong></del></span> <span class="inserted"><ins><em>way to 
&ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want 
that.</em></ins></span> This <span 
class="removed"><del><strong>&ldquo;service&rdquo;</strong></del></span> is 
<span class="removed"><del><strong>for suckers!&lt;/p&gt;
-
-&lt;p&gt;The server surely has</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;privacy policy,&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>typical example of the attitude of the 
proprietary software industry
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
+    typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1547,29 +1583,23 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>surely it</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
-    transmission</em></ins></span> is <span 
class="removed"><del><strong>worthless since nearly all</strong></del></span> 
<span class="inserted"><ins><em>a substantial expense for users.  Said 
transmission,
-    not wanted or requested by the user, clearly must constitute 
spying</em></ins></span>
-    of <span class="removed"><del><strong>them 
are.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>some 
kind.&lt;/p&gt;</em></ins></span>
+    that users can't delete&lt;/a&gt;, and they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
+  &lt;li id="M201506264"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found</em></ins></span> that <span 
class="removed"><del><strong>include 
-  &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-  Symphony surveillance software snoop on what radio and TV programs are 
-  playing nearby&lt;/a&gt;.  Also on what users post on various sites 
such</strong></del></span> <span class="inserted"><ins><em>90% of the 
top-ranked gratis proprietary
+    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
     Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;The article confusingly describes gratis apps</em></ins></span> 
as 
-  <span class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of them are 
not in fact &lt;a
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
     is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
@@ -1858,7 +1888,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/31 17:33:51 $
+$Date: 2021/02/01 11:02:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary/po/malware-mobiles.it.po        31 Jan 2021 17:33:51 -0000      
1.152
+++ proprietary/po/malware-mobiles.it.po        1 Feb 2021 11:02:29 -0000       
1.153
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -158,107 +158,37 @@
 msgid "Cell-phone communications"
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
-"phones\"> tracks the movements of each phone</a>."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"This is inherent in the design of the phone network: as long as the phone is "
-"in communication with the network, there is no way to stop the network from "
-"recording its location.  Many countries (including the US and the EU) "
-"require the network to store all these location data for months or years."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
-# | [-The-]{+Almost every phone's communication processor has a+} universal
-# | back door [-in portable phones-] {+which is+} <a
-# | 
href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\";>
-# | [-is employed-] {+often used+} to [-listen through their
-# | microphones</a>.-] {+make a phone transmit all conversations it
-# | hears</a>.+}
-#, fuzzy
-#| msgid ""
-#| "The universal back door in portable phones <a href=\"https://www.schneier.";
-#| "com/blog/archives/2006/12/remotely_eavesd_1.html\"> is employed to listen "
-#| "through their microphones</a>."
+#. type: Content of: <div><div><div><p>
 msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> often used to make a phone transmit all "
-"conversations it hears</a>."
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
 msgstr ""
-"La backdoor universale nei telefoni cellulari è effettivamente <a href="
-"\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/\";> "
-"usata per ascoltare attraverso i loro microfoni</a>."
 
 #. type: Content of: <div><div><div><ul><li><p>
-# | [-More about-]{+The back door+} <a
-# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
-# | nature-] {+class=\"not-a-duplicate\"
-# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
-# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
-# | years unfixed</a>.  The choice to leave the security holes in place is
-# | morally equivalent to writing a back door.+}
-#, fuzzy
-#| msgid ""
-#| "More about <a href=\"http://www.osnews.com/story/27416/";
-#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
-#| "this problem</a>."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
-"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
-"leave the security holes in place is morally equivalent to writing a back "
-"door."
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
 msgstr ""
-"Altre informazioni sulla <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\">natura di questo "
-"problema</a>."
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
+"The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
+"phones\"> tracks the movements of each phone</a>."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
+"This is inherent in the design of the phone network: as long as the phone is "
+"in communication with the network, there is no way to stop the network from "
+"recording its location.  Many countries (including the US and the EU) "
+"require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
-# | [-Most mobile phones have this-]{+The+} universal back [-door, which has
-# | been-] {+door is apparently also+} used to {+make phones+} <a
-# | 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\";>
-# | [-turn them malicious</a>.-] {+transmit even when they are turned off</a>.
-# |  This means their movements are tracked, and may also make the listening
-# | feature work.+}
-#, fuzzy
-#| msgid ""
-#| "Most mobile phones have this universal back door, which has been used to "
-#| "<a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-#| "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-#| "turn them malicious</a>."
-msgid ""
-"The universal back door is apparently also used to make phones <a href="
-"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
-msgstr ""
-"La maggior parte dei cellulari hanno questa backdoor universale, che è stata 
"
-"usata per <a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
-"\">renderli malevoli</a>."
-
 #. type: Content of: <div><div><div><h3>
 # | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
 #, fuzzy
@@ -351,25 +281,91 @@
 msgstr "Backdoor in dispositivi mobili"
 
 #. type: Content of: <div><div><p>
-# | [-This is separate from-]{+See above for the+} <a
-# | [-href=\"#universal-back-door-phone-modem\">the-]
-# | {+href=\"#universal-back-door-phone-modem\">general+} universal back
-# | [-door-] {+door</a>+} in [-the modem processor that the local phone
-# | company can use</a>.-] {+essentially all mobile phones, which permits
-# | converting them into full-time listening devices.+}
+# | [-The-]{+Almost every phone's communication processor has a+} universal
+# | back door [-in portable phones-] {+which is+} <a
+# | 
href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\";>
+# | [-is employed-] {+often used+} to [-listen through their
+# | microphones</a>.-] {+make a phone transmit all conversations it
+# | hears</a>.+}
 #, fuzzy
 #| msgid ""
-#| "This is separate from <a href=\"#universal-back-door-phone-modem\">the "
-#| "universal back door in the modem processor that the local phone company "
-#| "can use</a>."
+#| "The universal back door in portable phones <a href=\"https://www.schneier.";
+#| "com/blog/archives/2006/12/remotely_eavesd_1.html\"> is employed to listen "
+#| "through their microphones</a>."
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
+"Almost every phone's communication processor has a universal back door which "
+"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> often used to make a phone transmit all "
+"conversations it hears</a>."
 msgstr ""
-"Questa non va confusa con la <a href=\"#universal-back-door-phone-modem"
-"\">backdoor universale nel processore del modem</a> che può essere usata "
-"dalla compagnia telefonica locale."
+"La backdoor universale nei telefoni cellulari è effettivamente <a href="
+"\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/\";> "
+"usata per ascoltare attraverso i loro microfoni</a>."
+
+#. type: Content of: <div><div><p>
+# | [-More about-]{+The back door+} <a
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
+# | nature-] {+class=\"not-a-duplicate\"
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
+# | years unfixed</a>.  The choice to leave the security holes in place is
+# | morally equivalent to writing a back door.+}
+#, fuzzy
+#| msgid ""
+#| "More about <a href=\"http://www.osnews.com/story/27416/";
+#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
+#| "this problem</a>."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
+msgstr ""
+"Altre informazioni sulla <a href=\"http://www.osnews.com/story/27416/";
+"The_second_operating_system_hiding_in_every_mobile_phone\">natura di questo "
+"problema</a>."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+# | [-Most mobile phones have this-]{+The+} universal back [-door, which has
+# | been-] {+door is apparently also+} used to {+make phones+} <a
+# | 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\";>
+# | [-turn them malicious</a>.-] {+transmit even when they are turned off</a>.
+# |  This means their movements are tracked, and may also make the listening
+# | feature work.+}
+#, fuzzy
+#| msgid ""
+#| "Most mobile phones have this universal back door, which has been used to "
+#| "<a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+#| "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+#| "turn them malicious</a>."
+msgid ""
+"The universal back door is apparently also used to make phones <a href="
+"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
+msgstr ""
+"La maggior parte dei cellulari hanno questa backdoor universale, che è stata 
"
+"usata per <a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"
+"\">renderli malevoli</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2553,6 +2549,20 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "This is separate from <a href=\"#universal-back-door-phone-modem\">the "
+#~| "universal back door in the modem processor that the local phone company "
+#~| "can use</a>."
+#~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Questa non va confusa con la <a href=\"#universal-back-door-phone-modem"
+#~ "\">backdoor universale nel processore del modem</a> che può essere usata "
+#~ "dalla compagnia telefonica locale."
+
+#, fuzzy
+#~| msgid ""
 #~| "Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
 #~ msgid ""
 #~ "Copyright &copy; 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/malware-mobiles.ja-diff.html 31 Jan 2021 17:33:51 -0000      
1.121
+++ proprietary/po/malware-mobiles.ja-diff.html 1 Feb 2021 11:02:29 -0000       
1.122
@@ -155,98 +155,43 @@
 &lt;div class="frame"&gt;
 &lt;h3 id="phone-communications"&gt;Cell-phone communications&lt;/h3&gt;
 
+&lt;p&gt;This section describes one other malicious characteristic of mobile
+phones, location tracking which is caused by the underlying radio system
+rather than by the specific software in them.&lt;/p&gt;
+
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201502100"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The phone network</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-  turn them malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running proprietary Android versions 
come</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+  &lt;li id="M201502100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The phone network &lt;a
+    href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
     tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is inherent in the design of the phone network: as long as
-    the phone is in communication</em></ins></span> with <span 
class="removed"><del><strong>a
-  back door&lt;/a&gt; that provides remote access</strong></del></span> <span 
class="inserted"><ins><em>the network, there is no way</em></ins></span>
-    to <span class="inserted"><ins><em>stop</em></ins></span> the <span 
class="removed"><del><strong>data stored on</strong></del></span> <span 
class="inserted"><ins><em>network from recording its location.  Many countries
-    (including</em></ins></span> the
-  <span class="removed"><del><strong>device.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-  Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>US 
and</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>EU) require the network to store all
-    these location data for months or years.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;In Android, &lt;a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201311120.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="universal-back-door-phone-modem"&gt;
-    Almost every phone's communication processor</em></ins></span> has
-    a <span class="inserted"><ins><em>universal</em></ins></span> back door 
<span class="removed"><del><strong>to remotely delete apps.&lt;/a&gt;  
(It</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-    often used to make</em></ins></span> a <span 
class="removed"><del><strong>program
-  called GTalkService).
-  &lt;/p&gt;
-
-&lt;p&gt;Google can also</strong></del></span> <span 
class="inserted"><ins><em>phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The back door</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    may take</em></ins></span> the <span class="removed"><del><strong>Wayback 
Machine (archived May 20, 2015)"&gt;forcibly and remotely
-install apps&lt;/a&gt; through GTalkService (which seems, 
since</strong></del></span> <span class="inserted"><ins><em>form of 
bugs</em></ins></span> that <span class="removed"><del><strong>article, 
to</strong></del></span> have
-<span class="removed"><del><strong>been merged into Google Play).  This adds 
up</strong></del></span> <span class="inserted"><ins><em>gone 20 years 
unfixed&lt;/a&gt;.
-    The choice</em></ins></span> to <span class="removed"><del><strong>a 
universal back door. &lt;/p&gt;
-
-  &lt;p&gt;
-  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
-  malicious so far,</strong></del></span> <span 
class="inserted"><ins><em>leave</em></ins></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>security holes in place</em></ins></span> is <span 
class="removed"><del><strong>that nobody should have such power,
-  which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>morally
-    equivalent</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>writing</em></ins></span> a
-  <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
-  considers malicious.  But there</strong></del></span> <span 
class="inserted"><ins><em>back door.&lt;/p&gt;
-
-    &lt;p&gt;The back door</em></ins></span> is <span 
class="removed"><del><strong>no excuse for allowing</strong></del></span> <span 
class="inserted"><ins><em>in the &ldquo;modem processor&rdquo;, whose
-    job is to communicate with the radio network.  In most phones,
-    the modem processor controls the microphone.  In most 
phones</em></ins></span> it
-    <span class="inserted"><ins><em>has the power</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>rewrite the software for the main processor
-    too.&lt;/p&gt;
-
-    &lt;p&gt;A few phone models are specially designed so that the modem
-    processor does not control</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>microphone,</em></ins></span> and <span 
class="removed"><del><strong>you should</strong></del></span> <span 
class="inserted"><ins><em>so that it can't
-    change the software in the main processor.  They still</em></ins></span> 
have the <span class="removed"><del><strong>right</strong></del></span>
-    <span class="inserted"><ins><em>back door, but at least it is 
unable</em></ins></span> to
-  <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>turn the phone 
unto a
-    listening device.&lt;/p&gt;
-
-    &lt;p&gt;The universal back door is apparently also used</em></ins></span> 
to <span class="removed"><del><strong>trust in this way.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make phones 
&lt;a
-    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-    transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
-    are tracked, and may also make the listening feature 
work.&lt;/p&gt;</em></ins></span>
+    the phone is in communication with the network, there is no way
+    to stop the network from recording its location.  Many countries
+    (including the US and the EU) require the network to store all
+    these location data for months or years.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
-
-<span class="removed"><del><strong>&lt;h3 id="insecurity"&gt;Mobile 
Insecurity&lt;/h3&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/div&gt;
 
 &lt;div id="TOC" class="toc-inline"&gt;
-&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;</em></ins></span>
+&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;
 &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Many proprietary payment</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
   &lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
@@ -280,9 +225,34 @@
 
 &lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
 
-    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door-phone-modem"&gt;general universal back
-    door&lt;/a&gt; in essentially all mobile phones, which permits converting
-    them into full-time listening devices.&lt;/p&gt;
+    &lt;p id="universal-back-door-phone-modem"&gt;
+    Almost every phone's communication processor has
+    a universal back door which is &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The back door &lt;a class="not-a-duplicate"
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
+    The choice to leave the security holes in place is morally
+    equivalent to writing a back door.&lt;/p&gt;
+
+    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
+    job is to communicate with the radio network.  In most phones,
+    the modem processor controls the microphone.  In most phones it
+    has the power to rewrite the software for the main processor
+    too.&lt;/p&gt;
+
+    &lt;p&gt;A few phone models are specially designed so that the modem
+    processor does not control the microphone, and so that it can't
+    change the software in the main processor.  They still have the
+    back door, but at least it is unable to turn the phone unto a
+    listening device.&lt;/p&gt;
+
+    &lt;p&gt;The universal back door is apparently also used to make phones 
&lt;a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+    transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
+    are tracked, and may also make the listening feature work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202001090"&gt;
@@ -1073,8 +1043,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    spy on users even more than users expected. It</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -1116,7 +1088,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent</em></ins></span> them <span class="inserted"><ins><em>and 
text messages and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
@@ -1127,9 +1099,9 @@
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+    are</em></ins></span> malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
+    <span class="inserted"><ins><em>&lt;p&gt;Could Google have done a better 
job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -1141,10 +1113,13 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705230"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+  Samsung Galaxy devices running</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apps for BART &lt;a
@@ -1154,16 +1129,14 @@
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+    &lt;p&gt;With</em></ins></span> proprietary <span 
class="inserted"><ins><em>apps, one can only hope that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234 Android</em></ins></span> apps <span 
class="inserted"><ins><em>that track users by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234</em></ins></span> Android <span 
class="removed"><del><strong>versions come</strong></del></span> <span 
class="inserted"><ins><em>apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1173,7 +1146,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to</em></ins></span> personal data in <span 
class="inserted"><ins><em>the device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -1183,20 +1156,21 @@
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+    along</em></ins></span> with <span class="removed"><del><strong>a
+  back door&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>provides remote access</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="inserted"><ins><em>design</em></ins></span>
+    the <span class="inserted"><ins><em>app to snoop at 
all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
+    to transmit users' personal</em></ins></span> data <span 
class="removed"><del><strong>stored</strong></del></span> <span 
class="inserted"><ins><em>to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1206,25 +1180,35 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced</em></ins></span> an <span class="removed"><del><strong>insecure 
way&lt;/a&gt;.</strong></del></span> <span class="inserted"><ins><em>opt-in 
proprietary search app that it will&lt;/a&gt; pre-install
-    on some of its phones. The app will give Verizon the same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
+    on <span class="inserted"><ins><em>some of its phones. The app will give 
Verizon</em></ins></span> the
+  <span class="removed"><del><strong>device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span> <span class="inserted"><ins><em>same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect.</em></ins></span> However, 
the <span class="removed"><del><strong>worse aspect</strong></del></span> <span 
class="inserted"><ins><em>app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>these</strong></del></span> <span 
class="inserted"><ins><em>spyware is
-    still spyware.&lt;/p&gt;
+    being pre-installed</em></ins></span> on <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201701210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;In Android,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Meitu photo-editing app &lt;a
-    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data</em></ins></span> to <span class="removed"><del><strong>remotely 
delete apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1235,37 +1219,64 @@
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as a protection against
+    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>inadequate as</em></ins></span> a <span 
class="removed"><del><strong>program
+  called GTalkService).
+  &lt;/p&gt;
+
+&lt;p&gt;Google can also</strong></del></span> <span 
class="inserted"><ins><em>protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A &lt;a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and security of
-    283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>Wayback Machine (archived May 20, 
2015)"&gt;forcibly</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> and <span 
class="removed"><del><strong>remotely
+install apps&lt;/a&gt; through GTalkService (which seems, 
since</strong></del></span> <span class="inserted"><ins><em>security of
+    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>article, to have
+been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+  &lt;p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite</em></ins></span> of <span 
class="removed"><del><strong>this power has not been
+  malicious so far,</strong></del></span> the <span 
class="removed"><del><strong>point is that nobody should have such power,
+  which could also</strong></del></span> <span 
class="inserted"><ins><em>promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may</em></ins></span> be <span 
class="removed"><del><strong>used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>unawarely 
subject</em></ins></span> to <span class="removed"><del><strong>let 
a</strong></del></span> <span class="inserted"><ins><em>poor</em></ins></span> 
security <span class="removed"><del><strong>service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+  considers malicious.  But there</strong></del></span>
+    <span class="inserted"><ins><em>guarantees and abusive practices inflicted 
by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following</em></ins></span> is <span 
class="removed"><del><strong>no excuse for allowing it
+  to &lt;em&gt;delete&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>a non-exhaustive list, taken from</em></ins></span> 
the <span class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>research paper,
+    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>you should have the right</strong></del></span> 
<span class="inserted"><ins><em>infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
+      meant</em></ins></span> to
+  <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>track users and 
show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
+      permissions upon installation, meaning it has full 
access</em></ins></span> to <span class="removed"><del><strong>trust in this 
way.
+  &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However,</strong></del></span> <span class="inserted"><ins><em>users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
       for other</em></ins></span> apps <span class="removed"><del><strong>is 
that
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
 &lt;/p&gt;
@@ -1707,7 +1718,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/31 17:33:51 $
+$Date: 2021/02/01 11:02:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary/po/malware-mobiles.ja.po        31 Jan 2021 17:33:51 -0000      
1.143
+++ proprietary/po/malware-mobiles.ja.po        1 Feb 2021 11:02:29 -0000       
1.144
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -133,79 +133,36 @@
 msgid "Cell-phone communications"
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
-"phones\"> tracks the movements of each phone</a>."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"This is inherent in the design of the phone network: as long as the phone is "
-"in communication with the network, there is no way to stop the network from "
-"recording its location.  Many countries (including the US and the EU) "
-"require the network to store all these location data for months or years."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "The universal back door in portable phones <a href=\"https://www.schneier.";
-#| "com/blog/archives/2006/12/remotely_eavesd_1.html\"> is employed to listen "
-#| "through their microphones</a>."
-msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> often used to make a phone transmit all "
-"conversations it hears</a>."
-msgstr ""
-"携帯電話の万能バックドアが<a 
href=\"https://www.schneier.com/blog/";
-"archives/2006/12/remotely_eavesd_1.html\">そのマイクロフォンで盗聴するのに使"
-"われています</a>。"
-
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
-"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
-"leave the security holes in place is morally equivalent to writing a back "
-"door."
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
+"The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
+"phones\"> tracks the movements of each phone</a>."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Most mobile phones have a universal back door, which has been used to <a "
-#| "href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-#| "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-#| "turn them malicious</a>."
 msgid ""
-"The universal back door is apparently also used to make phones <a href="
-"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
+"This is inherent in the design of the phone network: as long as the phone is "
+"in communication with the network, there is no way to stop the network from "
+"recording its location.  Many countries (including the US and the EU) "
+"require the network to store all these location data for months or years."
 msgstr ""
-"ほとんどの携帯電話は万能バックドアを有しており、その機能は<a
 href=\"http://";
-"www.slate.com/blogs/future_tense/2013/07/22/"
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\">携帯"
-"電話を悪意のあるものに変える</a>のに使われてきました。"
 
 #. type: Content of: <div><div><div><h3>
 #, fuzzy
@@ -288,11 +245,64 @@
 msgstr "バックドア"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The universal back door in portable phones <a href=\"https://www.schneier.";
+#| "com/blog/archives/2006/12/remotely_eavesd_1.html\"> is employed to listen "
+#| "through their microphones</a>."
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
+"Almost every phone's communication processor has a universal back door which "
+"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> often used to make a phone transmit all "
+"conversations it hears</a>."
 msgstr ""
+"携帯電話の万能バックドアが<a 
href=\"https://www.schneier.com/blog/";
+"archives/2006/12/remotely_eavesd_1.html\">そのマイクロフォンで盗聴するのに使"
+"われています</a>。"
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Most mobile phones have a universal back door, which has been used to <a "
+#| "href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+#| "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+#| "turn them malicious</a>."
+msgid ""
+"The universal back door is apparently also used to make phones <a href="
+"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
+msgstr ""
+"ほとんどの携帯電話は万能バックドアを有しており、その機能は<a
 href=\"http://";
+"www.slate.com/blogs/future_tense/2013/07/22/"
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\">携帯"
+"電話を悪意のあるものに変える</a>のに使われてきました。"
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/malware-mobiles.pot  31 Jan 2021 17:33:51 -0000      1.118
+++ proprietary/po/malware-mobiles.pot  1 Feb 2021 11:02:29 -0000       1.119
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -99,60 +99,37 @@
 msgid "Cell-phone communications"
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The phone network <a "
-"href=\"https://ssd.eff.org/en/module/problem-mobile-phones\";> tracks the "
-"movements of each phone</a>."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"This is inherent in the design of the phone network: as long as the phone is "
-"in communication with the network, there is no way to stop the network from "
-"recording its location.  Many countries (including the US and the EU) "
-"require the network to store all these location data for months or years."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a "
-"href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\";>
 "
-"often used to make a phone transmit all conversations it hears</a>."
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" "
-"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
 "
-"may take the form of bugs that have gone 20 years unfixed</a>.  The choice "
-"to leave the security holes in place is morally equivalent to writing a back "
-"door."
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
+"The authorities in Venice track the <a "
+"href=\"https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html\";>
 "
+"movements of all tourists</a> using their portable phones.  The article says "
+"that <em>at present</em> the system is configured to report only aggregated "
+"information.  But that could be changed.  What will that system do 10 years "
+"from now? What will a similar system in another country do? Those are the "
+"questions this raises."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
+"The phone network <a "
+"href=\"https://ssd.eff.org/en/module/problem-mobile-phones\";> tracks the "
+"movements of each phone</a>."
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
-"The universal back door is apparently also used to make phones <a "
-"href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\";>
 "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
+"This is inherent in the design of the phone network: as long as the phone is "
+"in communication with the network, there is no way to stop the network from "
+"recording its location.  Many countries (including the US and the EU) "
+"require the network to store all these location data for months or years."
 msgstr ""
 
 #. type: Content of: <div><div><div><h3>
@@ -224,9 +201,43 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
+"Almost every phone's communication processor has a universal back door which "
+"is <a "
+"href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\";>
 "
+"often used to make a phone transmit all conversations it hears</a>."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door <a class=\"not-a-duplicate\" "
+"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
 "
+"may take the form of bugs that have gone 20 years unfixed</a>.  The choice "
+"to leave the security holes in place is morally equivalent to writing a back "
+"door."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The universal back door is apparently also used to make phones <a "
+"href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\";>
 "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/malware-mobiles.ru.po        31 Jan 2021 18:31:45 -0000      
1.266
+++ proprietary/po/malware-mobiles.ru.po        1 Feb 2021 11:02:29 -0000       
1.267
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-31 17:26+0000\n"
+"POT-Creation-Date: 2021-02-01 10:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -122,6 +123,23 @@
 msgid "Cell-phone communications"
 msgstr "Сотовая телефонная связь"
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -142,70 +160,6 @@
 "числе США и Евросоюз) требуют, чтобы сеть х
ранила эти данные о "
 "местоположении в течение месяцев или лет."
 
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"Almost every phone's communication processor has a universal back door which "
-"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> often used to make a phone transmit all "
-"conversations it hears</a>."
-msgstr ""
-"В коммуникационном процессоре почти 
любого телефона есть универсальный "
-"черный ход, который <a 
href=\"https://www.schneier.com/blog/archives/2006/12/";
-"remotely_eavesd_1.html\"> часто применяется, чтобы 
заставить телефон "
-"передавать все разговоры, которые он 
слышит</a>."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
-"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
-"leave the security holes in place is morally equivalent to writing a back "
-"door."
-msgstr ""
-"Лазейка <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\">может 
принимать "
-"форму ошибок, которые остаются 
неисправленными по 20 лет</a>. Решение "
-"оставить прорехи в защите незаделанными 
нравственно эквивалентно написанию "
-"лазейки."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
-"communicate with the radio network.  In most phones, the modem processor "
-"controls the microphone.  In most phones it has the power to rewrite the "
-"software for the main processor too."
-msgstr ""
-"Лазейка находится в &ldquo;модемном 
процессоре&rdquo;, который отвечает за "
-"связь с радиосетью. В большинстве 
телефонов модемный процессор контролирует 
"
-"работу микрофона. В большинстве телефонов 
он может переписывать программы и "
-"в главном процессоре."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"A few phone models are specially designed so that the modem processor does "
-"not control the microphone, and so that it can't change the software in the "
-"main processor.  They still have the back door, but at least it is unable to "
-"turn the phone unto a listening device."
-msgstr ""
-"Есть модели телефонов, специально 
спроектированные, чтобы микрофон не "
-"контролировался модемным процессором и 
чтобы он не мог изменять программы в "
-"главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью "
-"невозможно превратить телефон в 
подслушивающее устройство."
-
-#. type: Content of: <div><div><div><ul><li><p>
-msgid ""
-"The universal back door is apparently also used to make phones <a href="
-"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"transmit even when they are turned off</a>.  This means their movements are "
-"tracked, and may also make the listening feature work."
-msgstr ""
-"Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять "
-"телефоны <a 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"передавать, даже когда они выключены</a>. 
Это значит, что их перемещения "
-"отслеживаются, а возможно, включается и 
прослушивание."
-
 #. type: Content of: <div><div><div><h3>
 msgid "Types of malware in mobiles"
 msgstr "Виды вредоносных программ в мобильных 
устройствах"
@@ -282,13 +236,67 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
+"Almost every phone's communication processor has a universal back door which "
+"is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> often used to make a phone transmit all "
+"conversations it hears</a>."
 msgstr ""
-"Выше описана <a 
href=\"#universal-back-door-phone-modem\">универсальная "
-"лазейка</a>, которая есть по сути во всех 
мобильных телефонах и которая "
-"позволяет превращать их в штатные 
подслушивающие устройства."
+"В коммуникационном процессоре почти 
любого телефона есть универсальный "
+"черный ход, который <a 
href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> часто применяется, чтобы 
заставить телефон "
+"передавать все разговоры, которые он 
слышит</a>."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
+msgstr ""
+"Лазейка <a href=\"http://www.osnews.com/story/27416/";
+"The_second_operating_system_hiding_in_every_mobile_phone\">может 
принимать "
+"форму ошибок, которые остаются 
неисправленными по 20 лет</a>. Решение "
+"оставить прорехи в защите незаделанными 
нравственно эквивалентно написанию "
+"лазейки."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
+"communicate with the radio network.  In most phones, the modem processor "
+"controls the microphone.  In most phones it has the power to rewrite the "
+"software for the main processor too."
+msgstr ""
+"Лазейка находится в &ldquo;модемном 
процессоре&rdquo;, который отвечает за "
+"связь с радиосетью. В большинстве 
телефонов модемный процессор контролирует 
"
+"работу микрофона. В большинстве телефонов 
он может переписывать программы и "
+"в главном процессоре."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"A few phone models are specially designed so that the modem processor does "
+"not control the microphone, and so that it can't change the software in the "
+"main processor.  They still have the back door, but at least it is unable to "
+"turn the phone unto a listening device."
+msgstr ""
+"Есть модели телефонов, специально 
спроектированные, чтобы микрофон не "
+"контролировался модемным процессором и 
чтобы он не мог изменять программы в "
+"главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью "
+"невозможно превратить телефон в 
подслушивающее устройство."
+
+#. type: Content of: <div><div><p>
+msgid ""
+"The universal back door is apparently also used to make phones <a href="
+"\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"transmit even when they are turned off</a>.  This means their movements are "
+"tracked, and may also make the listening feature work."
+msgstr ""
+"Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять "
+"телефоны <a 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
+"передавать, даже когда они выключены</a>. 
Это значит, что их перемещения "
+"отслеживаются, а возможно, включается и 
прослушивание."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2429,6 +2437,15 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Выше описана <a 
href=\"#universal-back-door-phone-modem\">универсальная "
+#~ "лазейка</a>, которая есть по сути во всех 
мобильных телефонах и которая "
+#~ "позволяет превращать их в штатные 
подслушивающие устройства."
+
+#~ msgid ""
 #~ "The iPhone 7 contains DRM specifically designed to <a href=\"https://";
 #~ "motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-"
 #~ "unreplaceable-repair-software-lock\"> brick it if an &ldquo;"

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- proprietary/po/nl.po        31 Jan 2021 17:33:51 -0000      1.281
+++ proprietary/po/nl.po        1 Feb 2021 11:02:30 -0000       1.282
@@ -5372,6 +5372,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -5386,7 +5403,37 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
+#, fuzzy
+#| msgid "Type&nbsp;of malware"
+msgid "Types of malware in mobiles"
+msgstr "Soorten&nbsp;malware"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#deception\">Interference</a>-]
+# | {+href=\"#addictions\">Addictions</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Interference</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#deception\">Oplichterij</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#deception\">Interference</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Interference</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\">Oplichterij</a>"
+
+#. type: Content of: <div><div><h3>
+# | [-Apple Back Doors-]{+Addictions+}
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Addictions"
+msgstr "Apple-achterdeuren"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -5394,7 +5441,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -5403,7 +5450,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -5411,7 +5458,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -5419,7 +5466,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -5428,43 +5475,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-# | [-Type&nbsp;of-]{+Types of+} malware {+in mobiles+}
-#, fuzzy
-#| msgid "Type&nbsp;of malware"
-msgid "Types of malware in mobiles"
-msgstr "Soorten&nbsp;malware"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#deception\">Interference</a>-]
-# | {+href=\"#addictions\">Addictions</a>+}
-#, fuzzy
-#| msgid "<a href=\"#deception\">Interference</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#deception\">Oplichterij</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#deception\">Interference</a>-]
-# | {+href=\"#deception\">Deception</a>+}
-#, fuzzy
-#| msgid "<a href=\"#deception\">Interference</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Oplichterij</a>"
-
-#. type: Content of: <div><div><h3>
-# | [-Apple Back Doors-]{+Addictions+}
-#, fuzzy
-#| msgid "Apple Back Doors"
-msgid "Addictions"
-msgstr "Apple-achterdeuren"
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -8273,6 +8283,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary/po/pl.po        31 Jan 2021 17:33:51 -0000      1.280
+++ proprietary/po/pl.po        1 Feb 2021 11:02:30 -0000       1.281
@@ -4852,6 +4852,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -4866,7 +4883,36 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+# | [-<strong>Type&nbsp;of malware</strong>-]{+Types of malware in mobiles+}
+#, fuzzy
+#| msgid "<strong>Type&nbsp;of malware</strong>"
+msgid "Types of malware in mobiles"
+msgstr "<strong>Rodzaj malware</strong>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"#addictions\">Addictions</a>+}
+#, fuzzy
+#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr ""
+"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr ""
+"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr ""
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -4874,7 +4920,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -4883,7 +4929,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -4891,7 +4937,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -4899,7 +4945,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -4908,42 +4954,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-# | [-<strong>Type&nbsp;of malware</strong>-]{+Types of malware in mobiles+}
-#, fuzzy
-#| msgid "<strong>Type&nbsp;of malware</strong>"
-msgid "Types of malware in mobiles"
-msgstr "<strong>Rodzaj malware</strong>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
-# | {+href=\"#addictions\">Addictions</a>+}
-#, fuzzy
-#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr ""
-"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
-# | {+href=\"#deception\">Deception</a>+}
-#, fuzzy
-#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr ""
-"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -7703,6 +7713,14 @@
 "niesprawiedliwości: do&nbsp;złośliwych czynności."
 
 #. type: Content of: <div><div><p>
+msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
 # | Power [-corrupts, so-] {+corrupts;+} the proprietary program's developer
 # | is tempted to design the program to mistreat its [-users&mdash;that is, to
 # | make it <em>malware</em>.  (Malware means software-] {+users.  (Software+}

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary/po/pot  31 Jan 2021 17:33:51 -0000      1.279
+++ proprietary/po/pot  1 Feb 2021 11:02:30 -0000       1.280
@@ -4579,6 +4579,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -4593,7 +4610,23 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+msgid "Types of malware in mobiles"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr ""
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr ""
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -4601,7 +4634,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -4610,7 +4643,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -4618,7 +4651,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -4626,7 +4659,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -4635,29 +4668,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-msgid "Types of malware in mobiles"
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr ""
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -7268,6 +7278,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary/po/proprietary.de-diff.html     20 Jan 2021 09:02:59 -0000      
1.223
+++ proprietary/po/proprietary.de-diff.html     1 Feb 2021 11:02:30 -0000       
1.224
@@ -58,8 +58,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,9 +71,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -97,6 +97,12 @@
 software often leads to further injustices: malicious
 functionalities.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;In this section, we also list &lt;a
+href="/proprietary/malware-mobiles.html#phone-communications"&gt;one
+other malicious characteristic of mobile phones, location tracking&lt;/a&gt;
+which is caused by the underlying radio system rather than by the
+specific software in them.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Power corrupts; the proprietary program's developer is tempted to
 design the program to mistreat its users.  (Software whose functioning
 mistreats the user is called &lt;em&gt;malware&lt;/em&gt;.)  Of course, the
@@ -218,6 +224,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202101110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,17 +290,6 @@
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
-    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
-    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
-    an injustice to users. A free (as in freedom) program would let users
-    control the software. But when you use a proprietary software,
-    you won't be in control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -346,7 +353,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/20 09:02:59 $
+$Date: 2021/02/01 11:02:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary/po/proprietary.de.po    20 Jan 2021 09:02:59 -0000      1.259
+++ proprietary/po/proprietary.de.po    1 Feb 2021 11:02:30 -0000       1.260
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -73,6 +73,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -472,6 +480,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -535,16 +553,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.391
retrieving revision 1.392
diff -u -b -r1.391 -r1.392
--- proprietary/po/proprietary.es.po    20 Jan 2021 10:05:49 -0000      1.391
+++ proprietary/po/proprietary.es.po    1 Feb 2021 11:02:30 -0000       1.392
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -66,6 +67,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -329,6 +338,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -415,22 +434,6 @@
 "al usuario susceptible de ser espiado y también de ser presa de delincuentes 
"
 "informáticos</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-"El software de contabilidad personal Quicken <a href=\"https://www.quicken.";
-"com/support/quicken-discontinuation-policy\">tiene una política de cesación 
"
-"de servicios, o dicho de otra manera, obsolescencia programada</a>, lo que "
-"es una injusticia hacia los usuarios. Un programa libre permitiría a los "
-"usuarios controlar el software. Pero cuando se utiliza software privativo no "
-"se tiene el control."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -510,3 +513,18 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
+#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
+#~ "injustice to users. A free (as in freedom) program would let users "
+#~ "control the software. But when you use a proprietary software, you won't "
+#~ "be in control."
+#~ msgstr ""
+#~ "El software de contabilidad personal Quicken <a href=\"https://www.";
+#~ "quicken.com/support/quicken-discontinuation-policy\">tiene una política "
+#~ "de cesación de servicios, o dicho de otra manera, obsolescencia "
+#~ "programada</a>, lo que es una injusticia hacia los usuarios. Un programa "
+#~ "libre permitiría a los usuarios controlar el software. Pero cuando se "
+#~ "utiliza software privativo no se tiene el control."

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.438
retrieving revision 1.439
diff -u -b -r1.438 -r1.439
--- proprietary/po/proprietary.fr.po    20 Jan 2021 11:29:42 -0000      1.438
+++ proprietary/po/proprietary.fr.po    1 Feb 2021 11:02:30 -0000       1.439
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2021-01-20 12:21+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -63,6 +64,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -325,6 +334,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -410,22 +429,6 @@
 "l'espionnage et à l'exploitation de failles</a> par des pirates "
 "informatiques."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-"Le logiciel de comptabilité personnelle Quicken <a href=\"https://www.";
-"quicken.com/support/quicken-discontinuation-policy\">a une politique "
-"d'abandon de produit, autrement dit d'obsolescence programmée</a> qui "
-"constitue une injustice pour les utilisateurs. Un programme libre laisserait "
-"le contrôle aux utilisateurs, mais ce n'est pas le cas avec un logiciel "
-"privateur. "
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -498,3 +501,18 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
+#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
+#~ "injustice to users. A free (as in freedom) program would let users "
+#~ "control the software. But when you use a proprietary software, you won't "
+#~ "be in control."
+#~ msgstr ""
+#~ "Le logiciel de comptabilité personnelle Quicken <a href=\"https://www.";
+#~ "quicken.com/support/quicken-discontinuation-policy\">a une politique "
+#~ "d'abandon de produit, autrement dit d'obsolescence programmée</a> qui "
+#~ "constitue une injustice pour les utilisateurs. Un programme libre "
+#~ "laisserait le contrôle aux utilisateurs, mais ce n'est pas le cas avec un 
"
+#~ "logiciel privateur. "

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary/po/proprietary.it-diff.html     20 Jan 2021 09:03:00 -0000      
1.235
+++ proprietary/po/proprietary.it-diff.html     1 Feb 2021 11:02:30 -0000       
1.236
@@ -58,8 +58,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,9 +71,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -97,6 +97,12 @@
 software often leads to further injustices: malicious
 functionalities.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;In this section, we also list &lt;a
+href="/proprietary/malware-mobiles.html#phone-communications"&gt;one
+other malicious characteristic of mobile phones, location tracking&lt;/a&gt;
+which is caused by the underlying radio system rather than by the
+specific software in them.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Power corrupts; the proprietary program's developer is tempted to
 design the program to mistreat its users.  (Software whose functioning
 mistreats the user is called &lt;em&gt;malware&lt;/em&gt;.)  Of course, the
@@ -193,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -217,6 +223,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202101110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,17 +289,6 @@
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
-    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
-    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
-    an injustice to users. A free (as in freedom) program would let users
-    control the software. But when you use a proprietary software,
-    you won't be in control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -345,7 +352,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/20 09:03:00 $
+$Date: 2021/02/01 11:02:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary/po/proprietary.it.po    20 Jan 2021 09:03:00 -0000      1.268
+++ proprietary/po/proprietary.it.po    1 Feb 2021 11:02:30 -0000       1.269
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -72,6 +72,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -477,6 +485,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -529,16 +547,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary/po/proprietary.ja-diff.html     20 Jan 2021 09:03:00 -0000      
1.240
+++ proprietary/po/proprietary.ja-diff.html     1 Feb 2021 11:02:30 -0000       
1.241
@@ -28,10 +28,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -94,6 +94,12 @@
 software often leads to further injustices: malicious
 functionalities.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;In this section, we also list &lt;a
+href="/proprietary/malware-mobiles.html#phone-communications"&gt;one
+other malicious characteristic of mobile phones, location tracking&lt;/a&gt;
+which is caused by the underlying radio system rather than by the
+specific software in them.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Power corrupts; the proprietary program's developer is tempted to
 design the program to mistreat its users.  (Software whose functioning
 mistreats the user is called &lt;em&gt;malware&lt;/em&gt;.)  Of course, the
@@ -123,7 +129,8 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -135,8 +142,7 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -160,16 +166,16 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -222,6 +228,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202101110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -276,17 +294,6 @@
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
-    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
-    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
-    an injustice to users. A free (as in freedom) program would let users
-    control the software. But when you use a proprietary software,
-    you won't be in control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -350,7 +357,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/20 09:03:00 $
+$Date: 2021/02/01 11:02:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/proprietary.ja.po    20 Jan 2021 09:03:00 -0000      1.252
+++ proprietary/po/proprietary.ja.po    1 Feb 2021 11:02:30 -0000       1.253
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -64,6 +64,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -335,6 +343,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -387,16 +405,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary/po/proprietary.nl-diff.html     20 Jan 2021 09:03:00 -0000      
1.236
+++ proprietary/po/proprietary.nl-diff.html     1 Feb 2021 11:02:30 -0000       
1.237
@@ -58,8 +58,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,9 +71,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -97,6 +97,12 @@
 software often leads to further injustices: malicious
 functionalities.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;In this section, we also list &lt;a
+href="/proprietary/malware-mobiles.html#phone-communications"&gt;one
+other malicious characteristic of mobile phones, location tracking&lt;/a&gt;
+which is caused by the underlying radio system rather than by the
+specific software in them.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Power corrupts; the proprietary program's developer is tempted to
 design the program to mistreat its users.  (Software whose functioning
 mistreats the user is called &lt;em&gt;malware&lt;/em&gt;.)  Of course, the
@@ -217,6 +223,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202101110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,17 +289,6 @@
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
-    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
-    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
-    an injustice to users. A free (as in freedom) program would let users
-    control the software. But when you use a proprietary software,
-    you won't be in control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -345,7 +352,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/20 09:03:00 $
+$Date: 2021/02/01 11:02:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary/po/proprietary.nl.po    20 Jan 2021 09:03:00 -0000      1.242
+++ proprietary/po/proprietary.nl.po    1 Feb 2021 11:02:30 -0000       1.243
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -71,6 +71,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -380,6 +388,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -432,16 +450,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary/po/proprietary.pl-diff.html     20 Jan 2021 09:03:00 -0000      
1.253
+++ proprietary/po/proprietary.pl-diff.html     1 Feb 2021 11:02:30 -0000       
1.254
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
@@ -95,6 +95,12 @@
 software often leads to further injustices: malicious
 functionalities.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;In this section, we also list &lt;a
+href="/proprietary/malware-mobiles.html#phone-communications"&gt;one
+other malicious characteristic of mobile phones, location tracking&lt;/a&gt;
+which is caused by the underlying radio system rather than by the
+specific software in them.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Power <span class="removed"><del><strong>corrupts, 
so</strong></del></span> <span 
class="inserted"><ins><em>corrupts;</em></ins></span> the proprietary program's 
developer is tempted to
 design the program to mistreat its <span 
class="removed"><del><strong>users&mdash;that is, to make
 it &lt;em&gt;malware&lt;/em&gt;.  (Malware means 
software</strong></del></span> <span class="inserted"><ins><em>users.  
(Software</em></ins></span> whose functioning
@@ -160,18 +166,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -193,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -216,6 +222,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202101110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -270,17 +288,6 @@
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
-    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
-    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
-    an injustice to users. A free (as in freedom) program would let users
-    control the software. But when you use a proprietary software,
-    you won't be in control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -344,7 +351,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/20 09:03:00 $
+$Date: 2021/02/01 11:02:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary/po/proprietary.pl.po    20 Jan 2021 09:03:00 -0000      1.235
+++ proprietary/po/proprietary.pl.po    1 Feb 2021 11:02:30 -0000       1.236
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -87,6 +87,14 @@
 "niesprawiedliwości: do&nbsp;złośliwych czynności."
 
 #. type: Content of: <div><div><p>
+msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
 # | Power [-corrupts, so-] {+corrupts;+} the proprietary program's developer
 # | is tempted to design the program to mistreat its [-users&mdash;that is, to
 # | make it <em>malware</em>.  (Malware means software-] {+users.  (Software+}
@@ -561,6 +569,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -613,16 +631,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary/po/proprietary.pot      20 Jan 2021 09:03:00 -0000      1.232
+++ proprietary/po/proprietary.pot      1 Feb 2021 11:02:30 -0000       1.233
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -54,6 +54,15 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a "
+"href=\"/proprietary/malware-mobiles.html#phone-communications\">one other "
+"malicious characteristic of mobile phones, location tracking</a> which is "
+"caused by the underlying radio system rather than by the specific software "
+"in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -271,6 +280,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a "
+"href=\"https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html\";>
 "
+"movements of all tourists</a> using their portable phones.  The article says "
+"that <em>at present</em> the system is configured to report only aggregated "
+"information.  But that could be changed.  What will that system do 10 years "
+"from now? What will a similar system in another country do? Those are the "
+"questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a "
 
"href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom\";>took
 "
 "control of people's internet-connected chastity cages and demanded "
@@ -324,16 +344,6 @@
 "the user susceptible to be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a "
-"href=\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has "
-"a discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary/po/proprietary.pt-br.po 20 Jan 2021 09:03:00 -0000      1.382
+++ proprietary/po/proprietary.pt-br.po 1 Feb 2021 11:02:30 -0000       1.383
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2021-01-05 16:36-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -64,6 +64,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -325,6 +333,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -392,22 +410,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-"O software de gestão de finanças pessoais “Quicken” <a 
href=\"https://www.";
-"quicken.com/support/quicken-discontinuation-policy\"> tem uma política de "
-"descontinuação, também conhecida como obsolescência programada</a>, que 
é "
-"uma injustiça para os usuários. Um programa livre permitiria aos usuários "
-"controlar o software. Mas quando você usa um software privativo, você não "
-"estará no controle."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -483,6 +485,21 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
+#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
+#~ "injustice to users. A free (as in freedom) program would let users "
+#~ "control the software. But when you use a proprietary software, you won't "
+#~ "be in control."
+#~ msgstr ""
+#~ "O software de gestão de finanças pessoais “Quicken” <a 
href=\"https://www.";
+#~ "quicken.com/support/quicken-discontinuation-policy\"> tem uma política de 
"
+#~ "descontinuação, também conhecida como obsolescência programada</a>, 
que é "
+#~ "uma injustiça para os usuários. Um programa livre permitiria aos 
usuários "
+#~ "controlar o software. Mas quando você usa um software privativo, você 
não "
+#~ "estará no controle."
+
+#~ msgid ""
 #~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/";
 #~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
 #~ "control the software and, for example, disable it whenever it wants. "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.463
retrieving revision 1.464
diff -u -b -r1.463 -r1.464
--- proprietary/po/proprietary.ru.po    20 Jan 2021 15:32:02 -0000      1.463
+++ proprietary/po/proprietary.ru.po    1 Feb 2021 11:02:30 -0000       1.464
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -65,6 +66,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -328,6 +337,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -414,22 +433,6 @@
 "пользователя уязвимым к слежке и 
эксплуатации также со стороны взломщиков</"
 "a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-"В пакете управления персональными 
финансами Quicken есть <a href=\"https://";
-"www.quicken.com/support/quicken-discontinuation-policy\"> условие "
-"завершения, другими словами, 
запланированное устаревание</a>, это "
-"несправедливо по отношению к 
пользователям. Свободная (от слова &ldquo;"
-"свобода&rdquo;) программа давала бы 
пользователям контроль над собой. Но "
-"когда пользуешься несвободной 
программой, ее никогда не контролируешь."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +509,21 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
+#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
+#~ "injustice to users. A free (as in freedom) program would let users "
+#~ "control the software. But when you use a proprietary software, you won't "
+#~ "be in control."
+#~ msgstr ""
+#~ "В пакете управления персональными 
финансами Quicken есть <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> "
+#~ "условие завершения, другими словами, 
запланированное устаревание</a>, это "
+#~ "несправедливо по отношению к 
пользователям. Свободная (от слова &ldquo;"
+#~ "свобода&rdquo;) программа давала бы 
пользователям контроль над собой. Но "
+#~ "когда пользуешься несвободной 
программой, ее никогда не контролируешь."
+
+#~ msgid ""
 #~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/";
 #~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
 #~ "control the software and, for example, disable it whenever it wants. "

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary.tr.po    20 Jan 2021 16:43:24 -0000      1.115
+++ proprietary/po/proprietary.tr.po    1 Feb 2021 11:02:30 -0000       1.116
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2021-01-20 17:42+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.1\n"
 
@@ -64,6 +65,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -324,6 +333,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -408,22 +427,6 @@
 "\">ayrıca kullanıcıları, kırıcıların gizlice gözetlemesine ve 
suistimaline "
 "karşı kolay bir hedef haline getiriyor</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-"Kişisel finans yönetim yazılımı &ldquo;Quicken&rdquo; <a 
href=\"https://www.";
-"quicken.com/support/quicken-discontinuation-policy\"> bir devam etmeme "
-"politikasına, namı diğer planlı eskitmeye sahip</a>, bu kullanıcılara "
-"yönelik bir adaletsizliktir. Özgür bir program kullanıcıların 
yazılımı "
-"denetlemesine izin verecektir. Özel mülk bir yazılım kullandığınızda 
denetim "
-"sizde olmaz."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +508,21 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
+#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
+#~ "injustice to users. A free (as in freedom) program would let users "
+#~ "control the software. But when you use a proprietary software, you won't "
+#~ "be in control."
+#~ msgstr ""
+#~ "Kişisel finans yönetim yazılımı &ldquo;Quicken&rdquo; <a 
href=\"https://";
+#~ "www.quicken.com/support/quicken-discontinuation-policy\"> bir devam "
+#~ "etmeme politikasına, namı diğer planlı eskitmeye sahip</a>, bu "
+#~ "kullanıcılara yönelik bir adaletsizliktir. Özgür bir program "
+#~ "kullanıcıların yazılımı denetlemesine izin verecektir. Özel mülk 
bir "
+#~ "yazılım kullandığınızda denetim sizde olmaz."
+
+#~ msgid ""
 #~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/";
 #~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
 #~ "control the software and, for example, disable it whenever it wants. "

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary.zh-cn.po 21 Jan 2021 06:29:59 -0000      1.144
+++ proprietary/po/proprietary.zh-cn.po 1 Feb 2021 11:02:30 -0000       1.145
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2021-01-21 13:40+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-01 10:56+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -57,6 +58,14 @@
 "often leads to further injustices: malicious functionalities."
 msgstr "本页的重点是,专有软件开始的不å…
¬æ­£é€šå¸¸ä¼šå¯¼è‡´è¿›ä¸€æ­¥çš„不公正:恶意功能。"
 
+#. type: Content of: <div><div><p>
+msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
 # 这里参照的是繁体中文的翻译
 #. type: Content of: <div><div><p>
 msgid ""
@@ -304,6 +313,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -381,20 +400,6 @@
 "privacynotincluded/vibratissimo-panty-buster\">让用户容易被骇客嗅
探并利用</"
 "a>。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-"个人财务管理软件 &ldquo;Quicken&rdquo; <a 
href=\"https://www.quicken.com/";
-"support/quicken-discontinuation-policy\">有一个服务终止政策,又称为按计划过期"
-"</a>,这个政策对用户是不å…
¬æ­£çš„。自由软件是用户控制软件。但是如果你使用专有软"
-"件,那么你无法控制。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -480,6 +485,19 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
+#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
+#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
+#~ "injustice to users. A free (as in freedom) program would let users "
+#~ "control the software. But when you use a proprietary software, you won't "
+#~ "be in control."
+#~ msgstr ""
+#~ "个人财务管理软件 &ldquo;Quicken&rdquo; <a 
href=\"https://www.quicken.com/";
+#~ 
"support/quicken-discontinuation-policy\">有一个服务终止政策,又称为按计划"
+#~ "过期</a>,这个政策对用户是不å…
¬æ­£çš„。自由软件是用户控制软件。但是如果你使用"
+#~ "专有软件,那么你无法控制。"
+
+#~ msgid ""
 #~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
 #~ "href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";
 #~ "\">hackers</a>\".)</small>"

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary/po/proprietary.zh-tw-diff.html  20 Jan 2021 09:03:00 -0000      
1.216
+++ proprietary/po/proprietary.zh-tw-diff.html  1 Feb 2021 11:02:30 -0000       
1.217
@@ -58,8 +58,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -70,9 +71,8 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -97,6 +97,12 @@
 software often leads to further injustices: malicious
 functionalities.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;In this section, we also list &lt;a
+href="/proprietary/malware-mobiles.html#phone-communications"&gt;one
+other malicious characteristic of mobile phones, location tracking&lt;/a&gt;
+which is caused by the underlying radio system rather than by the
+specific software in them.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Power corrupts; the proprietary program's developer is tempted to
 design the program to mistreat its users.  (Software whose functioning
 mistreats the user is called &lt;em&gt;malware&lt;/em&gt;.)  Of course, the
@@ -218,6 +224,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202101130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The authorities in Venice track the &lt;a
+    
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
+    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
+    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
+    aggregated information.  But that could be changed.  What will that
+    system do 10 years from now?  What will a similar system in another
+    country do?  Those are the questions this raises.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202101110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,17 +290,6 @@
     the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
-    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
-    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
-    an injustice to users. A free (as in freedom) program would let users
-    control the software. But when you use a proprietary software,
-    you won't be in control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -346,7 +353,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/01/20 09:03:00 $
+$Date: 2021/02/01 11:02:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- proprietary/po/proprietary.zh-tw.po 20 Jan 2021 09:03:00 -0000      1.222
+++ proprietary/po/proprietary.zh-tw.po 1 Feb 2021 11:02:30 -0000       1.223
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-20 08:55+0000\n"
+"POT-Creation-Date: 2021-02-01 10:56+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -69,6 +69,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -450,6 +458,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-";
 "now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
 "control of people's internet-connected chastity cages and demanded ransom</"
@@ -502,16 +520,6 @@
 "be snooped and exploited by crackers as well</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The personal finance management software &ldquo;Quicken&rdquo; <a href="
-"\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
-"discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
-"injustice to users. A free (as in freedom) program would let users control "
-"the software. But when you use a proprietary software, you won't be in "
-"control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- proprietary/po/pt-br.po     31 Jan 2021 17:33:52 -0000      1.350
+++ proprietary/po/pt-br.po     1 Feb 2021 11:02:30 -0000       1.351
@@ -5617,6 +5617,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -5631,7 +5648,35 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+#, fuzzy
+#| msgid "Type&nbsp;of&nbsp;malware"
+msgid "Types of malware in mobiles"
+msgstr "Tipo&nbsp;de&nbsp;malware"
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary-subscriptions.html\">Assinaturas</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary-subscriptions.html\">Assinaturas</a>"
+
+#. type: Content of: <div><div><h3>
+#, fuzzy
+#| msgid "Latest additions"
+msgid "Addictions"
+msgstr "Últimas adições"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -5639,7 +5684,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -5648,7 +5693,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -5656,7 +5701,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -5664,7 +5709,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -5673,41 +5718,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-#, fuzzy
-#| msgid "Type&nbsp;of&nbsp;malware"
-msgid "Types of malware in mobiles"
-msgstr "Tipo&nbsp;de&nbsp;malware"
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr ""
-"<a href=\"/proprietary/proprietary-subscriptions.html\">Assinaturas</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr ""
-"<a href=\"/proprietary/proprietary-subscriptions.html\">Assinaturas</a>"
-
-#. type: Content of: <div><div><h3>
-#, fuzzy
-#| msgid "Latest additions"
-msgid "Addictions"
-msgstr "Últimas adições"
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -9050,6 +9060,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.594
retrieving revision 1.595
diff -u -b -r1.594 -r1.595
--- proprietary/po/ru.po        31 Jan 2021 19:01:36 -0000      1.594
+++ proprietary/po/ru.po        1 Feb 2021 11:02:30 -0000       1.595
@@ -6904,6 +6904,23 @@
 msgid "Cell-phone communications"
 msgstr "Сотовая телефонная связь"
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -6924,7 +6941,23 @@
 "числе США и Евросоюз) требуют, чтобы сеть х
ранила эти данные о "
 "местоположении в течение месяцев или лет."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+msgid "Types of malware in mobiles"
+msgstr "Виды вредоносных программ в мобильных 
устройствах"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"#addictions\"> Зависимость</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"#deception\"> Обман</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr "Зависимость"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -6936,7 +6969,7 @@
 "remotely_eavesd_1.html\"> часто применяется, чтобы 
заставить телефон "
 "передавать все разговоры, которые он 
слышит</a>."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -6950,7 +6983,7 @@
 "оставить прорехи в защите незаделанными 
нравственно эквивалентно написанию "
 "лазейки."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -6962,7 +6995,7 @@
 "работу микрофона. В большинстве телефонов 
он может переписывать программы и "
 "в главном процессоре."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -6974,7 +7007,7 @@
 "главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью "
 "невозможно превратить телефон в 
подслушивающее устройство."
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -6988,32 +7021,6 @@
 "передавать, даже когда они выключены</a>. 
Это значит, что их перемещения "
 "отслеживаются, а возможно, включается и 
прослушивание."
 
-#. type: Content of: <div><div><div><h3>
-msgid "Types of malware in mobiles"
-msgstr "Виды вредоносных программ в мобильных 
устройствах"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"#addictions\"> Зависимость</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\"> Обман</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr "Зависимость"
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-"Выше описана <a 
href=\"#universal-back-door-phone-modem\">универсальная "
-"лазейка</a>, которая есть по сути во всех 
мобильных телефонах и которая "
-"позволяет превращать их в штатные 
подслушивающие устройства."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -10920,6 +10927,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "
@@ -12670,6 +12685,15 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "See above for the <a href=\"#universal-back-door-phone-modem\">general "
+#~ "universal back door</a> in essentially all mobile phones, which permits "
+#~ "converting them into full-time listening devices."
+#~ msgstr ""
+#~ "Выше описана <a 
href=\"#universal-back-door-phone-modem\">универсальная "
+#~ "лазейка</a>, которая есть по сути во всех 
мобильных телефонах и которая "
+#~ "позволяет превращать их в штатные 
подслушивающие устройства."
+
+#~ msgid ""
 #~ "Vizio goes a step further than other TV manufacturers in spying on their "
 #~ "users: their <a href=\"http://www.propublica.org/article/own-a-vizio-";
 #~ "smart-tv-its-watching-you\"> &ldquo;smart&rdquo; TVs analyze your viewing "

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary/po/tr.po        31 Jan 2021 17:33:52 -0000      1.134
+++ proprietary/po/tr.po        1 Feb 2021 11:02:31 -0000       1.135
@@ -5023,6 +5023,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -5037,7 +5054,29 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+msgid "Types of malware in mobiles"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">Aldatma</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">Aldatma</a>"
+
+#. type: Content of: <div><div><h3>
+#, fuzzy
+#| msgid "Proprietary Addictions"
+msgid "Addictions"
+msgstr "Özel Mülk Bağımlılıklar"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -5045,7 +5084,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -5054,7 +5093,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -5062,7 +5101,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -5070,7 +5109,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -5079,35 +5118,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-msgid "Types of malware in mobiles"
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"/proprietary/proprietary-deception.html\">Aldatma</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"/proprietary/proprietary-deception.html\">Aldatma</a>"
-
-#. type: Content of: <div><div><h3>
-#, fuzzy
-#| msgid "Proprietary Addictions"
-msgid "Addictions"
-msgstr "Özel Mülk Bağımlılıklar"
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -8055,6 +8065,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/zh-cn.po     31 Jan 2021 17:33:52 -0000      1.137
+++ proprietary/po/zh-cn.po     1 Feb 2021 11:02:31 -0000       1.138
@@ -4960,6 +4960,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -4974,7 +4991,29 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+msgid "Types of malware in mobiles"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺骗</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺骗</a>"
+
+#. type: Content of: <div><div><h3>
+#, fuzzy
+#| msgid "Latest additions"
+msgid "Addictions"
+msgstr "最新添加"
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -4982,7 +5021,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -4991,7 +5030,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -4999,7 +5038,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -5007,7 +5046,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -5016,35 +5055,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-msgid "Types of malware in mobiles"
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺骗</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺骗</a>"
-
-#. type: Content of: <div><div><h3>
-#, fuzzy
-#| msgid "Latest additions"
-msgid "Addictions"
-msgstr "最新添加"
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -7814,6 +7824,14 @@
 "often leads to further injustices: malicious functionalities."
 msgstr "本页的重点是,专有软件开始的不å…
¬æ­£é€šå¸¸ä¼šå¯¼è‡´è¿›ä¸€æ­¥çš„不公正:恶意功能。"
 
+#. type: Content of: <div><div><p>
+msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
 # 这里参照的是繁体中文的翻译
 #. type: Content of: <div><div><p>
 msgid ""

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary/po/zh-tw.po     31 Jan 2021 17:33:52 -0000      1.280
+++ proprietary/po/zh-tw.po     1 Feb 2021 11:02:31 -0000       1.281
@@ -4850,6 +4850,23 @@
 msgid "Cell-phone communications"
 msgstr ""
 
+#. type: Content of: <div><div><div><p>
+msgid ""
+"This section describes one other malicious characteristic of mobile phones, "
+"location tracking which is caused by the underlying radio system rather than "
+"by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li><p>
+msgid ""
+"The authorities in Venice track the <a href=\"https://edition.cnn.com/travel/";
+"article/venice-control-room-tourism/index.html\"> movements of all tourists</"
+"a> using their portable phones.  The article says that <em>at present</em> "
+"the system is configured to report only aggregated information.  But that "
+"could be changed.  What will that system do 10 years from now? What will a "
+"similar system in another country do? Those are the questions this raises."
+msgstr ""
+
 #. type: Content of: <div><div><div><ul><li><p>
 msgid ""
 "The phone network <a href=\"https://ssd.eff.org/en/module/problem-mobile-";
@@ -4864,7 +4881,38 @@
 "require the network to store all these location data for months or years."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><div><h3>
+# | [-Type&nbsp;of&nbsp;malware-]{+Types of malware in mobiles+}
+#, fuzzy
+#| msgid "Type&nbsp;of&nbsp;malware"
+msgid "Types of malware in mobiles"
+msgstr "惡意軟體類型"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a
+# | [-href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>-]
+# | {+href=\"#addictions\">Addictions</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
+msgid "<a href=\"#addictions\">Addictions</a>"
+msgstr "<a href=\"/proprietary/proprietary-subscriptions.html\">期費</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a
+# | [-href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>-]
+# | {+href=\"#deception\">Deception</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
+msgid "<a href=\"#deception\">Deception</a>"
+msgstr "<a href=\"/proprietary/proprietary-subscriptions.html\">期費</a>"
+
+#. type: Content of: <div><div><h3>
+msgid "Addictions"
+msgstr ""
+
+#. type: Content of: <div><div><p>
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
@@ -4872,7 +4920,7 @@
 "conversations it hears</a>."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
 "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
@@ -4881,7 +4929,7 @@
 "door."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 "communicate with the radio network.  In most phones, the modem processor "
@@ -4889,7 +4937,7 @@
 "software for the main processor too."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A few phone models are specially designed so that the modem processor does "
 "not control the microphone, and so that it can't change the software in the "
@@ -4897,7 +4945,7 @@
 "turn the phone unto a listening device."
 msgstr ""
 
-#. type: Content of: <div><div><div><ul><li><p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -4906,44 +4954,6 @@
 "tracked, and may also make the listening feature work."
 msgstr ""
 
-#. type: Content of: <div><div><div><h3>
-# | [-Type&nbsp;of&nbsp;malware-]{+Types of malware in mobiles+}
-#, fuzzy
-#| msgid "Type&nbsp;of&nbsp;malware"
-msgid "Types of malware in mobiles"
-msgstr "惡意軟體類型"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a
-# | [-href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>-]
-# | {+href=\"#addictions\">Addictions</a>+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
-msgid "<a href=\"#addictions\">Addictions</a>"
-msgstr "<a href=\"/proprietary/proprietary-subscriptions.html\">期費</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a
-# | [-href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>-]
-# | {+href=\"#deception\">Deception</a>+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"/proprietary/proprietary-subscriptions.html\">期費</a>"
-
-#. type: Content of: <div><div><h3>
-msgid "Addictions"
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"See above for the <a href=\"#universal-back-door-phone-modem\">general "
-"universal back door</a> in essentially all mobile phones, which permits "
-"converting them into full-time listening devices."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Android phones subsidized by the US government come with <a href=\"https://";
@@ -7685,6 +7695,14 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
+"In this section, we also list <a href=\"/proprietary/malware-mobiles."
+"html#phone-communications\">one other malicious characteristic of mobile "
+"phones, location tracking</a> which is caused by the underlying radio system "
+"rather than by the specific software in them."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "Power corrupts; the proprietary program's developer is tempted to design the "
 "program to mistreat its users.  (Software whose functioning mistreats the "
 "user is called <em>malware</em>.)  Of course, the developer usually does not "

Index: philosophy/po/fighting-software-patents.ta-diff.html
===================================================================
RCS file: philosophy/po/fighting-software-patents.ta-diff.html
diff -N philosophy/po/fighting-software-patents.ta-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/fighting-software-patents.ta-diff.html        1 Feb 2021 
11:02:25 -0000       1.1
@@ -0,0 +1,145 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/fighting-software-patents.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;Fighting Software Patents
+- Singly and Together - GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/philosophy/po/fighting-software-patents.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Fighting Software Patents - Singly and Together&lt;/h2&gt;
+
+&lt;p&gt;by Richard Stallman&lt;/p&gt;
+
+&lt;p&gt;
+Software patents are the software project equivalent of land mines:
+each design decision carries a risk of stepping on a patent, which can
+destroy your project.&lt;/p&gt;
+&lt;p&gt;
+Developing a large and complex program means combining many ideas,
+often hundreds or thousands of them. In a country that allows
+software patents, chances are that some substantial fraction of the
+ideas in your program will be patented already by various companies.
+Perhaps hundreds of patents will cover parts of your program. A study
+in 2004 found almost 300 US patents that covered various parts of a
+single important program. It is so much work to do such a study that
+only one has been done.&lt;/p&gt;
+&lt;p&gt;
+Practically speaking, if you are a software developer, you will
+usually be threatened by one patent at a time. When this happens, you
+may be able to escape unscathed if you find legal grounds to overturn
+the patent. You may as well try it; if you succeed, that will mean one
+less mine in the mine field. If this patent is particularly
+threatening to the public, the &lt;a href="http://www.pubpat.org"&gt;Public
+Patent Foundation (pubpat.org)&lt;/a&gt; may take up the case; that is its
+specialty. If you ask for the computer-using community's help in
+searching for prior publication of the same idea, to use as evidence
+to overturn a patent, we should all respond with whatever useful
+information we might have.&lt;/p&gt;
+&lt;p&gt;
+However, fighting patents one by one will never eliminate the danger
+of software patents, any more than swatting mosquitos will eliminate
+malaria. You cannot expect to defeat every patent that comes at you,
+any more than you can expect to kill every monster in a video game:
+sooner or later, one is going to defeat you and damage your program.
+The US patent office issues around a hundred thousand software patents
+each year; our best efforts could never clear these mines as fast as
+they plant more.&lt;/p&gt;
+&lt;p&gt;
+Some of these mines are impossible to clear. Every software patent is
+harmful, and every software patent unjustly restricts how you use your
+computer, but not every software patent is legally invalid according
+to the patent system's criteria. The software patents we can overturn
+are those that result from &ldquo;mistakes&rdquo;, where the patent
+system's rules were not properly carried out. There is nothing we can
+do when the only relevant mistake was the policy of allowing software
+patents.&lt;/p&gt;
+&lt;p&gt;
+To make a part of the castle safe, you've got to do more than kill the
+monsters as they appear&mdash;you have to wipe out the generator that
+produces them. Overturning existing patents one by one will not make
+programming safe. To do that, we have to change the patent system so
+that patents can no longer threaten software developers and users.&lt;/p&gt;
+&lt;p&gt;
+There is no conflict between these two campaigns: we can work on the
+short-term escape and the long-term fix at once. If we take care, we
+can make our efforts to overturn individual software patents do double
+duty, building support for efforts to correct the whole problem. The
+crucial point is not to equate &ldquo;bad&rdquo; software patents with
+mistaken or invalid software patents. Each time we invalidate one
+software patent, each time we talk about our plans to try, we should
+say in no uncertain terms, &ldquo;One less software patent, one less
+menace to programmers: the target is zero.&rdquo;&lt;/p&gt;
+&lt;p&gt;
+The battle over software patents in the European Union is reaching a
+crucial stage. The European Parliament voted a year ago to reject
+software patents conclusively. In May, the Council of Ministers voted
+to undo the Parliament's amendments and make the directive even worse
+than when it started. However, at least one country that supported
+this has already reversed its vote. We must all do our utmost right
+now to convince an additional European country to change its vote, and
+to convince the newly elected members of the European Parliament to
+stand behind the previous vote. Please refer
+to &lt;a href="http://www.ffii.org/"&gt; www.ffii.org&lt;/a&gt; for more
+information on how to help, and to get in touch with other
+activists.&lt;/p&gt;
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send <span class="inserted"><ins><em>general</em></ins></span> 
FSF &amp; GNU inquiries to &lt;a
+href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.  There are also 
&lt;a
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.
+<span class="removed"><del><strong>&lt;br /&gt;
+Please send broken</strong></del></span>  <span 
class="inserted"><ins><em>Broken</em></ins></span> links and other
+corrections or suggestions <span class="inserted"><ins><em>can be 
sent</em></ins></span> to &lt;a
+href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;p&gt;Please</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the 
original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please</em></ins></span> see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations 
README&lt;/a&gt; for
+information on coordinating and submitting translations of this 
article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 2004 Richard Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2021/02/01 11:02:25 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]