www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www music/gdb-song.de.html philosophy/basic-fre...


From: GNUN
Subject: www music/gdb-song.de.html philosophy/basic-fre...
Date: Sat, 6 Feb 2021 07:37:56 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/02/06 07:37:55

Modified files:
        music          : gdb-song.de.html 
        philosophy     : basic-freedoms.es.html why-copyleft.it.html 
        philosophy/po  : why-copyleft.it-en.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 
Added files:
        music/po       : gdb-song.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/music/gdb-song.de.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/music/po/gdb-song.de-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.es.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/why-copyleft.it.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/why-copyleft.it-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.500&r2=1.501
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.376&r2=1.377
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.603&r2=1.604
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.309&r2=1.310
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.686&r2=1.687
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.442&r2=1.443
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.467&r2=1.468
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.599&r2=1.600
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.283&r2=1.284

Patches:
Index: music/gdb-song.de.html
===================================================================
RCS file: /web/www/www/music/gdb-song.de.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- music/gdb-song.de.html      3 Dec 2016 23:45:08 -0000       1.41
+++ music/gdb-song.de.html      6 Feb 2021 12:37:50 -0000       1.42
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/music/gdb-song.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/music/po/gdb-song.de.po">
+ https://www.gnu.org/music/po/gdb-song.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/music/gdb-song.html"
+ --><!--#set var="DIFF_FILE" value="/music/po/gdb-song.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2020-12-08" --><!--#set 
var="ENGLISH_PAGE" value="/music/gdb-song.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/music/po/gdb-song.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>GDB-Lied </h2>
 
 <!-- when you replace this graphics, make sure you change the link
@@ -134,7 +140,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2016/12/03 23:45:08 $ $Author: gnun $
+$Date: 2021/02/06 12:37:50 $ $Author: gnun $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/basic-freedoms.es.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.es.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- philosophy/basic-freedoms.es.html   6 Feb 2021 11:02:33 -0000       1.55
+++ philosophy/basic-freedoms.es.html   6 Feb 2021 12:37:51 -0000       1.56
@@ -131,12 +131,12 @@
 <div class="translators-credits">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
-<strong>Traducción: Equipo de traductorres al español de GNU.</strong></div>
+<strong>Traducción: Equipo de traductores al español de GNU.</strong></div>
 
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/02/06 11:02:33 $
+$Date: 2021/02/06 12:37:51 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/why-copyleft.it.html
===================================================================
RCS file: /web/www/www/philosophy/why-copyleft.it.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- philosophy/why-copyleft.it.html     5 Jul 2020 14:10:53 -0000       1.27
+++ philosophy/why-copyleft.it.html     6 Feb 2021 12:37:51 -0000       1.28
@@ -1,9 +1,4 @@
-<!--#set var="PO_FILE"
- value='<a href="/philosophy/po/why-copyleft.it.po">
- https://www.gnu.org/philosophy/po/why-copyleft.it.po</a>'
- --><!--#set var="ORIGINAL_FILE" value="/philosophy/why-copyleft.html"
- --><!--#set var="DIFF_FILE" value="/philosophy/po/why-copyleft.it-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2017-12-11" -->
+<!--#set var="ENGLISH_PAGE" value="/philosophy/why-copyleft.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.86 -->
@@ -13,7 +8,6 @@
 
 <!--#include virtual="/philosophy/po/why-copyleft.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
-<!--#include virtual="/server/outdated.it.html" -->
 <h2>Perché Copyleft?</h2>
 
 <p>
@@ -41,13 +35,13 @@
 </p>
 
 <p>
-Essere umili significa rinunciare ai propri interessi, ma a subire gli
-effetti della vostra scelta riguardo la licenza di software libero da
-utilizzare non siete soltanto voi e chi usa il vostro codice. Chi ne fa uso
-per lo sviluppo di un programma non libero sta cercando di negare libertà ad
-altri, e se voi lo lasciate fare state mancando di salvaguardare la libertà
-di altre persone. Quando si tratta di tutelare la libertà altrui, adagiarsi
-senza agire è un atto di debolezza, non di umiltà.
+Essere umili significa mettere da parte i propri interessi, ma gli interessi
+che abbandonate quando non usate il copyleft per il vostro  codice sono
+molto più ampi dei vostri. Chi usa il vostro codice per sviluppare un
+programma che non è libero sta privando altre persone della libertà; quindi,
+se lo permettete, non riuscite a difendere la libertà di quelle
+persone. Quando si tratta di tutelare la libertà altrui, adagiarsi senza
+agire è un atto di debolezza, non di umiltà.
 </p>
 
 <p>
@@ -59,6 +53,27 @@
 e modificare il software.
 </p>
 
+<p>
+Ecco alcuni esempi specifici di versioni proprietarie di programmi liberi,
+che hanno causato gravi danni al mondo libero.</p>
+
+<ul>
+<li>Coloro che hanno rilasciato LLVM con una licenza senza copyleft <a
+href="https://www.anandtech.com/show/5238/nvidia-releases-cuda-41-cuda-goes-llvm-and-open-source-kind-of";>
+hanno permesso a nVidia di rilasciare un compilatore non libero di alta
+qualità</a> per le sue GPU, mantenendo segreto il set di istruzioni. Per
+questo motivo non possiamo scrivere un compilatore libero per quella
+piattaforma senza un importante lavoro di <cite>reverse
+engineering</cite>. L'adattamento non libero di LLVM è l'unico disponibile
+per quelle macchine, ed è probabile che rimanga tale.</li>
+
+<li>Nella backdoor del <cite>Managenment Engine</cite> dei suoi processori
+moderni, Intel utilizza <a
+href="http://www.tomshardware.com/news/google-removing-minix-management-engine-intel,35876.html";>
+una versione proprietaria del sistema MINIX </a>, che è libero ma senza
+copyleft.</li>
+</ul>
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -110,14 +125,17 @@
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
      document was modified, or published.
+     
      If you wish to list earlier years, that is ok too.
      Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
      years, as long as each year in the range is in fact a copyrightable
      year, i.e., a year in which the document was published (including
      being publicly visible on the web or in a revision control system).
+     
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2003, 2007, 2008, 2013 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2003, 2007, 2008, 2013, 2017, 2018, 2020 Free Software
+Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
@@ -128,12 +146,12 @@
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
 Tradotto originariamente da Dora Scilipoti. Revisioni successive di Giorgio
-Padrin.</div>
+Padrin, Enrico Bella.</div>
 
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2020/07/05 14:10:53 $
+$Date: 2021/02/06 12:37:51 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/why-copyleft.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/why-copyleft.it-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- philosophy/po/why-copyleft.it-en.html       12 Apr 2014 14:00:03 -0000      
1.15
+++ philosophy/po/why-copyleft.it-en.html       6 Feb 2021 12:37:51 -0000       
1.16
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.86 -->
 <title>Why Copyleft?
 - GNU Project - Free Software Foundation</title>
 <!--#include virtual="/philosophy/po/why-copyleft.translist" -->
@@ -13,12 +13,12 @@
 
 <p>
 In the GNU Project we usually recommend people
-use <a href="/copyleft/copyleft.html">copyleft</a> licenses like GNU
+use <a href="/licenses/copyleft.html">copyleft</a> licenses like GNU
 GPL, rather than permissive non-copyleft free software licenses.  We
 don't argue harshly against the non-copyleft licenses&mdash;in fact,
 we occasionally recommend them in special circumstances&mdash;but the
 advocates of those licenses show a pattern of arguing harshly against
-the <acronym title="General Public License">GPL</acronym>.
+the <abbr title="General Public License">GPL</abbr>.
 </p>
 
 <p>
@@ -31,23 +31,43 @@
 </p>
 
 <p>
-Humility is abnegating your own self interest, but you and the one who
-uses your code are not the only ones affected by your choice of which
-free software license to use for your code.  Someone who uses your
-code in a nonfree program is trying to deny freedom to others, and if
-you let him do it, you're failing to defend their freedom.  When it
-comes to defending the freedom of others, to lie down and do nothing
-is an act of weakness, not humility.
+Humility is disregarding your own self-interest, but the interest you
+abandon when you don't copyleft your code is much bigger than your
+own.  Someone who uses your code in a nonfree program is denying
+freedom to others, so if you allow that, you're failing to defend
+those people's freedom.  When it comes to defending everyone's
+freedom, to lie down and do nothing is an act of weakness, not
+humility.
 </p>
 
 <p>
-Releasing your code under one of the BSD licenses, or some other
-permissive non-copyleft license, is not doing wrong; the program is
-still free software, and still a contribution to our community.  But
-it is weak, and in most cases it is not the best way to promote users'
-freedom to share and change software.
+Releasing your code under <a href="/licenses/bsd.html"> one of the BSD
+licenses</a>, or some other lax, permissive license, is not doing
+wrong; the program is still free software, and still a contribution to
+our community.  But it is weak, and in most cases it is not the best
+way to promote users' freedom to share and change software.
 </p>
 
+<p>
+Here are specific examples of nonfree versions of free programs
+that have done major harm to the free world.</p>
+
+<ul>
+<li>Those who released LLVM under a non-copyleft
+license <a 
href="https://www.anandtech.com/show/5238/nvidia-releases-cuda-41-cuda-goes-llvm-and-open-source-kind-of";>enabled
+nVidia to release a high-quality nonfree compiler</a> for its GPUs,
+while keeping its instruction set secret.  Thus, we can't write a free
+compiler for that platform without a big reverse engineering job.  The
+nonfree adaptation of LLVM is the only compiler for those machines,
+and is likely to remain so.</li>
+
+<li>Intel uses
+<a 
href="http://www.tomshardware.com/news/google-removing-minix-management-engine-intel,35876.html";>a
+proprietary version of the MINIX system</a>, which is free but not
+copylefted, in the Management Engine back door in its modern
+processors.</li>
+</ul>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -80,7 +100,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -95,20 +115,20 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2003, 2007, 2008, 2013 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2003, 2007, 2008, 2013, 2017, 2018, 2020 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/12 14:00:03 $
+$Date: 2021/02/06 12:37:51 $
 <!-- timestamp end -->
 </p>
 </div>
-</div>
+</div><!-- for class="inner", starts in the banner include -->
 </body>
 </html>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/de.po        6 Feb 2021 11:02:33 -0000       1.283
+++ proprietary/po/de.po        6 Feb 2021 12:37:51 -0000       1.284
@@ -8817,6 +8817,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary/po/es.po        6 Feb 2021 11:02:33 -0000       1.402
+++ proprietary/po/es.po        6 Feb 2021 12:37:51 -0000       1.403
@@ -8860,6 +8860,21 @@
 "tiempo completo."
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 # | Baidu apps were <a
 # | 
href=\"https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/\";>{+
 # | +}caught collecting sensitive personal data</a> that can be used for

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.500
retrieving revision 1.501
diff -u -b -r1.500 -r1.501
--- proprietary/po/fr.po        6 Feb 2021 11:02:33 -0000       1.500
+++ proprietary/po/fr.po        6 Feb 2021 12:37:51 -0000       1.501
@@ -7609,6 +7609,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/it.po        6 Feb 2021 11:02:33 -0000       1.283
+++ proprietary/po/it.po        6 Feb 2021 12:37:51 -0000       1.284
@@ -8241,6 +8241,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- proprietary/po/ja.po        6 Feb 2021 11:02:33 -0000       1.291
+++ proprietary/po/ja.po        6 Feb 2021 12:37:51 -0000       1.292
@@ -6446,6 +6446,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary/po/malware-mobiles.de-diff.html 4 Feb 2021 11:34:17 -0000       
1.100
+++ proprietary/po/malware-mobiles.de-diff.html 6 Feb 2021 12:37:51 -0000       
1.101
@@ -150,7 +150,7 @@
     (including the US and the EU) require the network to store all
     these location data for months or years.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost every phone's communication 
processor</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost every phone's 
communication</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 &lt;/div&gt;
 
@@ -192,7 +192,7 @@
 &lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
 
     &lt;p id="universal-back-door-phone-modem"&gt;
-    Almost every phone's communication processor</em></ins></span> has
+    Almost every phone's communication</em></ins></span> processor has
     a universal back door which is &lt;a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
     often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
@@ -412,7 +412,7 @@
 <span class="removed"><del><strong>&lt;ul&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Siri,</strong></del></span>
+  &lt;p&gt;Siri, Alexa,</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908020"&gt;
@@ -433,24 +433,24 @@
   &lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri,</em></ins></span> Alexa, and all the other voice-control 
systems can be &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked</strong></del></span>
+    &lt;p&gt;Siri, Alexa,</em></ins></span> and all the other voice-control 
systems can be &lt;a <span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked</em></ins></span> by programs that play commands in ultrasound 
that humans
     can't <span class="removed"><del><strong>hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hear&lt;/a&gt;.&lt;/p&gt;
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hear&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807020"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in the owner's contact 
list&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704050"&gt;
+  &lt;li id="M201704050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;Many Android devices &lt;a
@@ -529,15 +529,15 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; 
in</strong></del></span>
+      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-    WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
-    in various ways.&lt;/p&gt;
+    WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be 
recovered</em></ins></span>
+    in <span class="inserted"><ins><em>various ways.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201607280"&gt;
@@ -616,7 +616,7 @@
     data from third parties in general, but it can't protect</em></ins></span> 
that <span class="removed"><del><strong>&ldquo;in spite 
of</strong></del></span> <span class="inserted"><ins><em>data
     from</em></ins></span> the
     <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span class="inserted"><ins><em>state. 
 Quite</em></ins></span> the
-    <span class="removed"><del><strong>majority of</strong></del></span> <span 
class="inserted"><ins><em>contrary: confiding your data to someone
+    <span class="removed"><del><strong>majority of VPN</strong></del></span> 
<span class="inserted"><ins><em>contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your rights.&lt;/p&gt;
   &lt;/li&gt;
@@ -745,6 +745,21 @@
     full-time listening devices&lt;/a&gt;.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202012070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1303,7 +1318,7 @@
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority 
of</em></ins></span> VPN
+    for privacy, security, and anonymity given by the majority of 
VPN</em></ins></span>
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
@@ -1868,7 +1883,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:17 $
+$Date: 2021/02/06 12:37:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary/po/malware-mobiles.de.po        4 Feb 2021 11:34:17 -0000       
1.154
+++ proprietary/po/malware-mobiles.de.po        6 Feb 2021 12:37:52 -0000       
1.155
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1078,6 +1078,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary/po/malware-mobiles.es.po        5 Feb 2021 10:31:58 -0000       
1.227
+++ proprietary/po/malware-mobiles.es.po        6 Feb 2021 12:37:52 -0000       
1.228
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -951,6 +952,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/malware-mobiles.fr.po        4 Feb 2021 17:31:18 -0000       
1.238
+++ proprietary/po/malware-mobiles.fr.po        6 Feb 2021 12:37:52 -0000       
1.239
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-02-04 18:05+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -949,6 +950,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary/po/malware-mobiles.it-diff.html 4 Feb 2021 11:34:18 -0000       
1.105
+++ proprietary/po/malware-mobiles.it-diff.html 6 Feb 2021 12:37:52 -0000       
1.106
@@ -864,6 +864,21 @@
     full-time listening devices&lt;/a&gt;.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202012070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1897,7 +1912,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:18 $
+$Date: 2021/02/06 12:37:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary/po/malware-mobiles.it.po        4 Feb 2021 11:34:18 -0000       
1.154
+++ proprietary/po/malware-mobiles.it.po        6 Feb 2021 12:37:52 -0000       
1.155
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1034,6 +1034,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary/po/malware-mobiles.ja-diff.html 4 Feb 2021 11:34:18 -0000       
1.123
+++ proprietary/po/malware-mobiles.ja-diff.html 6 Feb 2021 12:37:52 -0000       
1.124
@@ -87,30 +87,21 @@
 runs.  However, in practice nonfree software</strong></del></span> <span 
class="inserted"><ins><em>users; &lt;a
 
href="/philosophy/free-software-even-more-important.html"&gt;that</em></ins></span>
 is <span class="removed"><del><strong>often malware, 
because</strong></del></span> the <span 
class="removed"><del><strong>developer's awareness</strong></del></span>
 <span class="inserted"><ins><em>basic injustice&lt;/a&gt;. The developers and 
manufacturers often exercise</em></ins></span>
-that <span class="inserted"><ins><em>power to the detriment 
of</em></ins></span> the users <span class="removed"><del><strong>would be 
powerless</strong></del></span> <span class="inserted"><ins><em>they 
ought</em></ins></span> to <span class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> <span 
class="inserted"><ins><em>serve.&lt;/p&gt;
-
-&lt;p&gt;This typically takes</em></ins></span> the <span 
class="removed"><del><strong>developer to impose some.
+that <span class="removed"><del><strong>the users would be 
powerless</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> to <span 
class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> the <span 
class="removed"><del><strong>developer to impose some.
 &lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Here are examples</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="inserted"><ins><em>malicious functionalities.&lt;/p&gt;
-&lt;hr class="full-width" /&gt;
-&lt;/div&gt;
+&lt;p&gt;Here are examples</strong></del></span> <span 
class="inserted"><ins><em>detriment</em></ins></span> of <span 
class="removed"><del><strong>malware in mobile devices.  See 
also</strong></del></span> the <span class="removed"><del><strong>&lt;a 
href="/proprietary/malware-apple.html"&gt;the Apple malware
+page&lt;/a&gt; for malicious functionalities specific</strong></del></span> 
<span class="inserted"><ins><em>users they ought</em></ins></span> to <span 
class="inserted"><ins><em>serve.&lt;/p&gt;
 
-&lt;div class="article"&gt;
-&lt;p&gt;Nearly all mobile phones do two grievous wrongs to their users:
-tracking their movements, and listening to their conversations.  This
-is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;
+&lt;p&gt;This typically takes</em></ins></span> the <span 
class="removed"><del><strong>Apple iThings.&lt;/p&gt;
 
-&lt;p&gt;The</em></ins></span> malware <span class="inserted"><ins><em>we list 
here is present</em></ins></span> in <span class="removed"><del><strong>mobile 
devices.  See also
-the &lt;a href="/proprietary/malware-apple.html"&gt;the</strong></del></span> 
<span class="inserted"><ins><em>every phone, or in software
-that is not made by</em></ins></span> Apple <span 
class="removed"><del><strong>malware
-page&lt;/a&gt; for malicious</strong></del></span> <span 
class="inserted"><ins><em>or Google (including its subsidiaries).
-Malicious</em></ins></span> functionalities <span 
class="removed"><del><strong>specific to the</strong></del></span> <span 
class="inserted"><ins><em>in mobile software released by</em></ins></span> 
Apple <span class="removed"><del><strong>iThings.&lt;/p&gt;
+&lt;div class="toc"&gt;</strong></del></span> <span 
class="inserted"><ins><em>form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;</em></ins></span>
 
-&lt;div class="toc"&gt;
-&lt;div class="malfunctions"&gt;
+&lt;div <span class="removed"><del><strong>class="malfunctions"&gt;
 &lt;ul&gt;
 &lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
@@ -120,18 +111,17 @@
 &lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
-    management&lt;/a&gt;</strong></del></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data</strong></del></span>
-<span class="inserted"><ins><em>Google are listed</em></ins></span> in <span 
class="removed"><del><strong>their computers.&lt;/li&gt;
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can</strong></del></span> <span 
class="inserted"><ins><em>class="article"&gt;
+&lt;p&gt;Nearly all mobile phones</em></ins></span> do <span 
class="removed"><del><strong>with the data in</strong></del></span> <span 
class="inserted"><ins><em>two grievous wrongs to</em></ins></span> their <span 
class="removed"><del><strong>computers.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>dedicated pages, &lt;a
-href="/proprietary/malware-apple.html"&gt;Apple's Operating Systems are
-Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
-Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;
+&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>users:
+tracking their movements, and listening to their conversations.  This
+is why we call them &ldquo;Stalin's dream&rdquo;.&lt;/p&gt;
 
-&lt;div class="important"&gt;
-&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system not 
&ldquo;authorized&rdquo; by the
+&lt;p&gt;The malware we list here is present in every phone, or in 
software</em></ins></span>
+that <span class="removed"><del><strong>reject any operating 
system</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> not <span 
class="removed"><del><strong>&ldquo;authorized&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>made</em></ins></span> by <span 
class="removed"><del><strong>the
     manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
@@ -139,36 +129,77 @@
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The universal back door</strong></del></span> <span 
class="inserted"><ins><em>ought to be</em></ins></span> in <span 
class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>this page but isn't
-here, please write
-to</em></ins></span> &lt;a
+  &lt;li&gt;&lt;p&gt;The universal back door</strong></del></span> <span 
class="inserted"><ins><em>Apple or Google (including its subsidiaries).
+Malicious functionalities</em></ins></span> in <span 
class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>mobile software released by Apple or
+Google are listed in dedicated pages,</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;</em></ins></span>
-to <span class="removed"><del><strong>listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+    employed</strong></del></span>
+<span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple's 
Operating Systems are
+Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
+Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Most mobile phones have a universal back door, which has 
been
+  used</strong></del></span> <span class="inserted"><ins><em>be in this page 
but isn't
+here, please write</em></ins></span>
+to &lt;a
+  <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  turn them malicious&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+  Samsung Galaxy devices running proprietary Android versions come with a
+  back door&lt;/a&gt; that provides remote access to the data stored on the
+  device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  Samsung's back door&lt;/a&gt; provides access</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;</em></ins></span>
+to <span class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Most mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include the URL 
of</em></ins></span> a <span class="removed"><del><strong>universal back door, 
which has been
-  used</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+  &lt;li&gt;
+  &lt;p&gt;In Android, &lt;a
+  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>back 
door</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
+to <span class="removed"><del><strong>remotely delete apps.&lt;/a&gt;  
(It</strong></del></span> <span class="inserted"><ins><em>serve as specific 
substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="frame"&gt;
 &lt;h3 id="phone-communications"&gt;Cell-phone communications&lt;/h3&gt;
 
 &lt;p&gt;This section describes one other malicious characteristic of mobile
-phones, location tracking which is caused by the underlying radio system
-rather than by the specific software in them.&lt;/p&gt;
+phones, location tracking which</em></ins></span> is <span 
class="inserted"><ins><em>caused by the underlying radio system
+rather than by the specific software</em></ins></span> in <span 
class="removed"><del><strong>a program
+  called GTalkService).
+  &lt;/p&gt;
+
+&lt;p&gt;Google can also &lt;a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202101130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The authorities in Venice track the &lt;a
+    &lt;p&gt;The authorities in Venice track</em></ins></span> the <span 
class="removed"><del><strong>Wayback Machine (archived May 20, 
2015)"&gt;forcibly and remotely
+install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
+been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
+
+  &lt;p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
-    movements of all tourists&lt;/a&gt; using their portable phones.  The 
article
-    says that &lt;em&gt;at present&lt;/em&gt; the system is configured to 
report only
-    aggregated information.  But that could be changed.  What will that
-    system do 10 years from now?  What will a similar system in another
+    movements</em></ins></span> of <span class="removed"><del><strong>this 
power has not been
+  malicious so far,</strong></del></span> <span class="inserted"><ins><em>all 
tourists&lt;/a&gt; using their portable phones.  The article
+    says that &lt;em&gt;at present&lt;/em&gt;</em></ins></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>system</em></ins></span> is <span 
class="inserted"><ins><em>configured to report only
+    aggregated information.  But</em></ins></span> that <span 
class="removed"><del><strong>nobody should have such power,
+  which</strong></del></span> could <span 
class="removed"><del><strong>also</strong></del></span> be <span 
class="removed"><del><strong>used maliciously.  You might well decide to let a
+  security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</strong></del></span> <span class="inserted"><ins><em>changed.  What 
will</em></ins></span> that <span class="removed"><del><strong>it
+  considers malicious.  But</strong></del></span>
+    <span class="inserted"><ins><em>system do 10 years from now?  What will a 
similar system in another
     country do?  Those are the questions this raises.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -180,18 +211,23 @@
     tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is inherent in the design of the phone network: as long as
-    the phone is in communication with the network, there is no way
-    to stop the network from recording its location.  Many countries
-    (including the US and the EU) require the network to store all
-    these location data for months or years.&lt;/p&gt;
+    the phone is in communication with the network,</em></ins></span> there is 
no <span class="removed"><del><strong>excuse for allowing 
it</strong></del></span> <span class="inserted"><ins><em>way</em></ins></span>
+    to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>stop the network from recording its location.  
Many countries
+    (including</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>US</em></ins></span> and <span 
class="removed"><del><strong>you should have</strong></del></span> the <span 
class="removed"><del><strong>right to
+  decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>EU) require the network</em></ins></span> to <span 
class="removed"><del><strong>trust in this way.
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>store all
+    these location data for months or years.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
-&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;h3 id="insecurity"&gt;Mobile 
Insecurity&lt;/h3&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
 &lt;div id="TOC" class="toc-inline"&gt;
-&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;
+&lt;h3&gt;Types of malware in mobiles&lt;/h3&gt;</em></ins></span>
 &lt;ul&gt;
-  &lt;li&gt;&lt;a href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#addictions"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
   &lt;li&gt;&lt;a href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;
@@ -211,14 +247,17 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201604040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;Many <span class="removed"><del><strong>proprietary payment 
apps</strong></del></span> <span class="inserted"><ins><em>popular mobile games 
include a random-reward system called</em></ins></span>
+    &lt;a
+<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data</strong></del></span> <span 
class="inserted"><ins><em>href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; 
which is especially effective on
+    children. One variant of gacha was declared illegal</em></ins></span> in 
<span class="removed"><del><strong>an insecure way&lt;/a&gt;.
+However,</strong></del></span> <span class="inserted"><ins><em>Japan in 2012,
+    but</em></ins></span> the <span class="removed"><del><strong>worse 
aspect</strong></del></span> <span class="inserted"><ins><em>other variants are 
still &lt;a
     
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate 
amounts</em></ins></span> of <span 
class="removed"><del><strong>these</strong></del></span>
+    <span class="inserted"><ins><em>money on virtual toys.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -665,6 +704,21 @@
     full-time listening devices&lt;/a&gt;.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202012070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1052,10 +1106,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-  turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -1097,7 +1149,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent</em></ins></span> them <span class="inserted"><ins><em>and 
text messages and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
@@ -1108,9 +1160,9 @@
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
-    are</em></ins></span> malicious&lt;/a&gt;.&lt;/p&gt;
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    <span class="inserted"><ins><em>&lt;p&gt;Could Google have done a better 
job of preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -1122,13 +1174,10 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+  &lt;li id="M201705230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apps for BART &lt;a
@@ -1138,13 +1187,13 @@
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With</em></ins></span> proprietary <span 
class="inserted"><ins><em>apps, one can only hope that they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234</em></ins></span> Android <span 
class="removed"><del><strong>versions come</strong></del></span> <span 
class="inserted"><ins><em>apps that track users by &lt;a
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
@@ -1165,21 +1214,20 @@
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
-    along</em></ins></span> with <span class="removed"><del><strong>a
-  back door&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>the headphone's unique serial number.&lt;/p&gt;
+    along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>provides remote access</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="inserted"><ins><em>design</em></ins></span>
-    the <span class="inserted"><ins><em>app to snoop at 
all&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal</em></ins></span> data <span 
class="removed"><del><strong>stored</strong></del></span> <span 
class="inserted"><ins><em>to servers. &lt;a
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1189,35 +1237,25 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
-    on <span class="inserted"><ins><em>some of its phones. The app will give 
Verizon</em></ins></span> the
-  <span class="removed"><del><strong>device.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-  Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span> <span class="inserted"><ins><em>same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user must
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</em></ins></span>
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;In Android,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+  &lt;li id="M201701210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>remotely 
delete apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1228,64 +1266,37 @@
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>inadequate as</em></ins></span> a <span 
class="removed"><del><strong>program
-  called GTalkService).
-  &lt;/p&gt;
-
-&lt;p&gt;Google can also</strong></del></span> <span 
class="inserted"><ins><em>protection against
+    consent&rdquo; for surveillance is inadequate as a protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>Wayback Machine (archived May 20, 
2015)"&gt;forcibly</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> and <span 
class="removed"><del><strong>remotely
-install apps&lt;/a&gt; through GTalkService (which seems, 
since</strong></del></span> <span class="inserted"><ins><em>security of
-    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>article, to have
-been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
-
-  &lt;p&gt;
-  Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite</em></ins></span> of <span 
class="removed"><del><strong>this power has not been
-  malicious so far,</strong></del></span> the <span 
class="removed"><del><strong>point is that nobody should have such power,
-  which could also</strong></del></span> <span 
class="inserted"><ins><em>promises
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may</em></ins></span> be <span 
class="removed"><del><strong>used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>unawarely 
subject</em></ins></span> to <span class="removed"><del><strong>let 
a</strong></del></span> <span class="inserted"><ins><em>poor</em></ins></span> 
security <span class="removed"><del><strong>service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
-  considers malicious.  But there</strong></del></span>
-    <span class="inserted"><ins><em>guarantees and abusive practices inflicted 
by VPN apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following</em></ins></span> is <span 
class="removed"><del><strong>no excuse for allowing it
-  to &lt;em&gt;delete&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>a non-exhaustive list, taken from</em></ins></span> 
the <span class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>research paper,
-    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>you should have the right</strong></del></span> 
<span class="inserted"><ins><em>infringe their
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to
-  <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>track users and 
show them targeted ads.&lt;/dd&gt;
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full 
access</em></ins></span> to <span class="removed"><del><strong>trust in this 
way.
-  &lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
-&lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;Many proprietary payment apps &lt;a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data in an insecure way&lt;/a&gt;.
-However,</strong></del></span> <span class="inserted"><ins><em>users'
+      permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
       for other</em></ins></span> apps <span class="removed"><del><strong>is 
that
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
 &lt;/p&gt;
@@ -1727,7 +1738,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:18 $
+$Date: 2021/02/06 12:37:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary/po/malware-mobiles.ja.po        4 Feb 2021 11:34:18 -0000       
1.145
+++ proprietary/po/malware-mobiles.ja.po        6 Feb 2021 12:37:52 -0000       
1.146
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -806,6 +806,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/malware-mobiles.pot  4 Feb 2021 11:34:19 -0000       1.120
+++ proprietary/po/malware-mobiles.pot  6 Feb 2021 12:37:52 -0000       1.121
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -652,6 +652,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a "
+"href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth\";> "
+"location tracking unknown to those companies and those organizations</a>.  "
+"It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a "
 
"href=\"https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/\";>
 "
 "caught collecting sensitive personal data</a> that can be used for lifetime "

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- proprietary/po/malware-mobiles.ru.po        4 Feb 2021 16:31:45 -0000       
1.270
+++ proprietary/po/malware-mobiles.ru.po        6 Feb 2021 12:37:52 -0000       
1.271
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -937,6 +938,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary/po/nl.po        6 Feb 2021 11:02:34 -0000       1.284
+++ proprietary/po/nl.po        6 Feb 2021 12:37:52 -0000       1.285
@@ -5821,6 +5821,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/pl.po        6 Feb 2021 11:02:34 -0000       1.283
+++ proprietary/po/pl.po        6 Feb 2021 12:37:52 -0000       1.284
@@ -5279,6 +5279,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary/po/pot  6 Feb 2021 11:02:34 -0000       1.282
+++ proprietary/po/pot  6 Feb 2021 12:37:52 -0000       1.283
@@ -4993,6 +4993,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary/po/proprietary-surveillance.de-diff.html        4 Feb 2021 
11:34:20 -0000       1.164
+++ proprietary/po/proprietary-surveillance.de-diff.html        6 Feb 2021 
12:37:52 -0000       1.165
@@ -1639,26 +1639,41 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202003260"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version of Zoom</em></ins></span> &lt;a
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users' data</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+      demanded users submit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>those 
companies</em></ins></span> and <span class="inserted"><ins><em>those
+    organizations&lt;/a&gt;.  It's actually</em></ins></span> some
+      <span class="removed"><del><strong>are starting to 
realize</strong></del></span> <span class="inserted"><ins><em>widely used 
libraries</em></ins></span> that <span class="removed"><del><strong>it is 
nasty.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if</em></ins></span> the 
<span class="removed"><del><strong>&lt;a
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>user doesn't have</em></ins></span>
-    a <span class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>Facebook account. According</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example 
of</strong></del></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>article, Zoom and Facebook
-    don't even mention this surveillance on their privacy policy page,
-    making this an obvious violation</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>proprietary software 
developer A tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example 
of</strong></del></span> <span 
class="inserted"><ins><em>mistreat</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>end user.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="inserted"><ins><em>Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if</em></ins></span> the 
<span class="removed"><del><strong>proprietary software industry towards
+      those they</strong></del></span> <span class="inserted"><ins><em>user 
doesn't</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's privacy even in their
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>a Facebook account. According to the 
article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
@@ -1687,15 +1702,16 @@
     surveillance for other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="inserted"><ins><em>be a &lt;a
-    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    &lt;p&gt;The ToToc messaging app seems to be a</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in addition to
+      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
     Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>that is a good
     reason to use free software instead.&lt;/p&gt;
 
@@ -1726,74 +1742,73 @@
   <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Chinese Communist 
Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked the user to
+      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>Chinese Communist Party's 
&ldquo;Study</em></ins></span>
+    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>requires users to grant</em></ins></span> it <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>contain a
-    back-door allowing developers</em></ins></span> to <span 
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span 
class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="removed"><del><strong>developer</strong></del></span> 
<span class="inserted"><ins><em>is mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The &lt;a
-    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly 
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
-      ask about sending it to other companies.  This 
shows</strong></del></span>
-    <span class="inserted"><ins><em>readable after copy-pasting in a text 
editor) includes a clarification
-    saying that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android 
version</em></ins></span>
-    of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a 
flashlight</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909091"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>send any information to anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>phone's microphone, photos, text messages, 
contacts, and
+    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Android version was found</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing 
developers</em></ins></span> to <span class="removed"><del><strong>anyone?  A 
free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>broad permissions</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>run any code they wish</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>order</em></ins></span> to <span 
class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
-    functionalities.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy was found to make</strong></del></span> 
<span class="inserted"><ins><em>the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version</em></ins></span> of the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
       a speech recognition company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
       can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      enable crackers to listen in on a child's speech, 
and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users</em></ins></span> even <span 
class="removed"><del><strong>speak</strong></del></span> <span 
class="inserted"><ins><em>when it is turned off&lt;/a&gt;, after tricking 
them</em></ins></span>
+    into <span class="inserted"><ins><em>giving</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and 
Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
        was snooping on its users through the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
+  &lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Keeping track of who downloads a</em></ins></span> proprietary 
<span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
@@ -1829,39 +1844,39 @@
     it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</strong></del></span>
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="inserted"><ins><em>privacy-enhancing features
-    of</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>operating system, 
in order</em></ins></span> to <span class="removed"><del><strong>these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>gather as much private data as
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order</em></ins></span> to <span 
class="inserted"><ins><em>gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    having control over</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>software we 
run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    not</em></ins></span> to <span class="inserted"><ins><em>allow 
them</em></ins></span> access <span class="removed"><del><strong>the 
data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could 
listen</strong></del></span> to <span class="removed"><del><strong>these 
conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1917,14 +1932,17 @@
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Data collected by menstrual and 
pregnancy monitoring apps is often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1937,11 +1955,9 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Data collected by menstrual and 
pregnancy monitoring apps is often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
 Note that</strong></del></span> <span class="inserted"><ins><em>insurance 
companies&lt;/a&gt;. Even though</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span>
     <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>not really
@@ -1951,14 +1967,7 @@
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized and aggregated,&rdquo; it can 
easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
-
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>do so. A
-    free-software app that does more or less the same thing without
-    spying</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1968,24 +1977,16 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>you is 
available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>movements</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it can <span 
class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
   this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>Android phones and iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1997,32 +1998,28 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span class="inserted"><ins><em>the 
phone has to be responsible</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+      specifically</strong></del></span> <span class="inserted"><ins><em>woman 
who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>sending
-    the location data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>women's rights to equal employment
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>do so. A
+    free-software app that does more or less the same thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2034,33 +2031,52 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Many Android phones 
come</em></ins></span> with <span class="removed"><del><strong>it,
-      is</strong></del></span> a <span 
class="removed"><del><strong>surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>huge number of</em></ins></span> &lt;a
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span> <span 
class="inserted"><ins><em>you</em></ins></span> is <span 
class="removed"><del><strong>a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>available from</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer, 
based</strong></del></span> <span class="inserted"><ins><em>data, or pass 
it</em></ins></span> on <span class="removed"><del><strong>the 
fact</strong></del></span> <span class="inserted"><ins><em>to user-installed 
apps</em></ins></span> that <span class="inserted"><ins><em>have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>device is 
tethered</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
+      Canary camera</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>fact
+      that</strong></del></span> <span class="inserted"><ins><em>data for 
years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates that the device gives the company
-      surveillance capability.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that the device 
gives</strong></del></span> <span class="inserted"><ins><em>be responsible for 
sending</em></ins></span>
+    the <span class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>location data to Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> the 
<span class="removed"><del><strong>manufacturer is using it to outsmart
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>&ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>data, or 
pass</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access 
to</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer is using 
it</strong></del></span> <span class="inserted"><ins><em>network but no direct 
access</em></ins></span> to <span class="removed"><del><strong>outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>the data. This results</em></ins></span> in 
<span class="removed"><del><strong>e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -2157,38 +2173,42 @@
       really a matter</strong></del></span> <span class="inserted"><ins><em>in 
apparent violation</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems are an
       intolerable invasion</strong></del></span>
     <span class="inserted"><ins><em>Google's policies. But it seems that 
Google wasn't aware</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>it,
-    and, once informed, was</em></ins></span> in <span 
class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>no hurry</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>take 
action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>car's 
location</strong></del></span> <span class="inserted"><ins><em>policies of a 
development platform are ineffective</em></ins></span> at <span 
class="removed"><del><strong>any time. (See</strong></del></span>
-    <span class="inserted"><ins><em>preventing nonfree software developers 
from including malware in
-    their programs.&lt;/p&gt;
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>it,
+    and, once informed, was in no hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>invasion 
isn't done by malware. The other
+      cases mentioned</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform</em></ins></span> 
are <span class="removed"><del><strong>done by 
proprietary</strong></del></span> <span class="inserted"><ins><em>ineffective at
+    preventing nonfree software developers from including</em></ins></span> 
malware in
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if the state orders it to 
get</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+  &lt;li id="M201902041.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
+      determine the car's location at any time. (See</strong></del></span>
+    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if the state orders it to get the 
data</strong></del></span> <span class="inserted"><ins><em>often malicious ads 
on users,</em></ins></span> and <span class="removed"><del><strong>hand it 
over, the state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;!-- #SpywareAtHome</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Twenty nine &ldquo;beauty 
camera&rdquo; apps that used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>redirecting
+    them</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
@@ -2197,21 +2217,16 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
-        designed</strong></del></span> <span class="inserted"><ins><em>Google 
Play had one or more malicious functionalities, such as</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>everyone in 
the house, all</strong></del></span> <span class="inserted"><ins><em>phishing 
sites that stole their credentials. Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Lots</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
+    the user interface</em></ins></span> of <span 
class="removed"><del><strong>&ldquo;smart&rdquo; products 
are</strong></del></span> <span class="inserted"><ins><em>most of them 
was</em></ins></span> designed <span class="removed"><del><strong>&lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span> to <span 
class="removed"><del><strong>everyone in the house, all the 
time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any 
way</strong></del></span> <span class="inserted"><ins><em>user 
interface</em></ins></span> of
-    <span class="removed"><del><strong>making a device that can obey your 
voice commands without
-    potentially spying on you.  Even</strong></del></span> <span 
class="inserted"><ins><em>most of them was designed to make uninstallation
+    &lt;p&gt;Today's technological practice does not include any 
way</strong></del></span> <span class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous 
apps</em></ins></span> if <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;Users should</em></ins></span> of
+    <span class="removed"><del><strong>making a device that can obey your 
voice commands without
+    potentially spying on you.  Even</strong></del></span> <span 
class="inserted"><ins><em>course uninstall these dangerous 
apps</em></ins></span> if <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>they
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there</em></ins></span> is <span class="removed"><del><strong>air-gapped, 
it could be
@@ -2258,87 +2273,82 @@
     &lt;p&gt;Vizio
     &ldquo;smart&rdquo;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>a way to
-    disable</strong></del></span>
-    the <span class="removed"><del><strong>surveillance, even if it were not 
hidden as it was in</strong></del></span> <span class="inserted"><ins><em>top 
10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that</em></ins></span> these 
<span class="removed"><del><strong>TVs, does not legitimize the 
surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    and cable&lt;/a&gt;. Even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of</em></ins></span>
+    the <span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to 
get</strong></del></span> <span class="inserted"><ins><em>Weather Channel app 
&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored</em></ins></span> users' <span class="removed"><del><strong>formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>locations to 
the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of</em></ins></span> what 
<span class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>it will do
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>TV reports</strong></del></span> <span 
class="inserted"><ins><em>users of</em></ins></span> what it <span 
class="removed"><del><strong>is. The existence of</strong></del></span> <span 
class="inserted"><ins><em>will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;We think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>data is a secondary issue. The principal wrong here 
is</em></ins></span> that <span class="removed"><del><strong>TVs are not 
allowed to report what</strong></del></span>
-    the <span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
+    &lt;p&gt;We think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way to
+    disable</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>surveillance, 
even if it were not hidden as it was in
+    these TVs,</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> does <span 
class="removed"><del><strong>not legitimize</strong></del></span>
+    <span class="inserted"><ins><em>with</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>data is a secondary issue. The principal wrong 
here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising 
ID,&rdquo;</em></ins></span> so that <span 
class="removed"><del><strong>advertisers</strong></del></span>
-    <span class="inserted"><ins><em>Facebook</em></ins></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
+    &lt;p&gt;The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;</em></ins></span>
+    report <span class="removed"><del><strong>was as of 2014, but we don't 
expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>on the user's actions</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>are totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>it obtains 
from</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>same machine via
+    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>correlate the 
data</em></ins></span> it <span class="removed"><del><strong>enabled by default
-      is an injustice already.&lt;/p&gt;
+    &lt;p&gt;Proper laws would</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others 
only</em></ins></span> say that <span class="removed"><del><strong>TVs are not 
allowed to report what</strong></del></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
   &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households 
to</strong></del></span> <span class="inserted"><ins><em>obtains 
from</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles</strong></del></span> <span 
class="inserted"><ins><em>same machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others only say that 
the user is
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers 
in</strong></del></span> <span class="inserted"><ins><em>is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    &lt;p&gt;This</em></ins></span> spying <span 
class="removed"><del><strong>on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers 
can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;</em></ins></span>
+    track <span class="removed"><del><strong>you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
@@ -2346,27 +2356,27 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when</em></ins></span> users <span 
class="inserted"><ins><em>disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>turn off the 
other kinds of location
-    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the misleading control.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to turn <span 
class="removed"><del><strong>this off,</strong></del></span> <span 
class="inserted"><ins><em>off the other kinds of location
+    tracking,</em></ins></span> but <span class="removed"><del><strong>having 
it enabled</strong></del></span> <span class="inserted"><ins><em>most users 
will be tricked</em></ins></span> by <span class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201806110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>listens through 
the microphone&lt;/a&gt;.&lt;/p&gt;
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;We expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="inserted"><ins><em>save
-    a recording. But we can't</em></ins></span> be
-      <span class="removed"><del><strong>picked up</strong></del></span> <span 
class="inserted"><ins><em>sure from the article.&lt;/p&gt;
+    a recording. But we can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -2377,25 +2387,32 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running</strong></del></span> 
<span class="inserted"><ins><em>researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The</em></ins></span> other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping</em></ins></span>
-    in
-      <span class="removed"><del><strong>range so as to 
determine</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
-
-    &lt;p&gt;This is evidence</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+    of</em></ins></span> the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being 
watched</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied</em></ins></span> by
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>researchers were 
found</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in
+      <span class="removed"><del><strong>range so as to determine 
that</strong></del></span> <span class="inserted"><ins><em>these proprietary 
apps whose
+    source code</em></ins></span> they <span class="removed"><del><strong>are 
nearby.  Once your
       Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and
-      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+      correlate ads with Web activity, and</strong></del></span> <span 
class="inserted"><ins><em>cannot look at.  The</em></ins></span> other <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs 
recognize</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android users
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track</strong></del></span>
 <span class="inserted"><ins><em>apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="inserted"><ins><em>the proprietary apps by getting apps 
from the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2405,7 +2422,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users</em></ins></span> are <span 
class="removed"><del><strong>watching&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>HIV-positive, then provides the information to
+    which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
@@ -2417,7 +2434,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>more than users expected. It &lt;a
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
@@ -3598,7 +3615,7 @@
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    monitor every aspect of</em></ins></span> what <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3615,7 +3632,7 @@
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized</em></ins></span> people <span 
class="removed"><del><strong>are watching&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>can intercept communications between parent and 
child and spoof messages to and from the watch, possibly endangering the 
child.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
@@ -3691,7 +3708,7 @@
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
     connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates even when the ignition
+    including car location. This feature operates</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
@@ -4451,7 +4468,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:20 $
+$Date: 2021/02/06 12:37:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.376
retrieving revision 1.377
diff -u -b -r1.376 -r1.377
--- proprietary/po/proprietary-surveillance.de.po       4 Feb 2021 11:34:20 
-0000       1.376
+++ proprietary/po/proprietary-surveillance.de.po       6 Feb 2021 12:37:52 
-0000       1.377
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -2203,6 +2203,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
 "k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
 "account\">is sending users' data to Facebook</a> even if the user doesn't "

Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary/po/proprietary-surveillance.es.po       5 Feb 2021 10:31:59 
-0000       1.153
+++ proprietary/po/proprietary-surveillance.es.po       6 Feb 2021 12:37:53 
-0000       1.154
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-02-05 11:04+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -1760,6 +1761,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
 "k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
 "account\">is sending users' data to Facebook</a> even if the user doesn't "

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.603
retrieving revision 1.604
diff -u -b -r1.603 -r1.604
--- proprietary/po/proprietary-surveillance.fr.po       4 Feb 2021 17:31:18 
-0000       1.603
+++ proprietary/po/proprietary-surveillance.fr.po       6 Feb 2021 12:37:53 
-0000       1.604
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-02-04 18:05+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1755,6 +1756,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
 "k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
 "account\">is sending users' data to Facebook</a> even if the user doesn't "

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/proprietary-surveillance.it-diff.html        4 Feb 2021 
11:34:20 -0000       1.230
+++ proprietary/po/proprietary-surveillance.it-diff.html        6 Feb 2021 
12:37:53 -0000       1.231
@@ -1431,20 +1431,28 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+    makes it</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="removed"><del><strong>wire 
to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>injustice of nonfree 
software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015</strong></del></span> <span class="inserted"><ins><em>nasty thing, 
but cannot make</em></ins></span> it <span class="inserted"><ins><em>less 
nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1454,20 +1462,60 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202003260"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>Zoom &lt;a
-    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending</em></ins></span> users' <span 
class="removed"><del><strong>pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>data to 
Facebook&lt;/a&gt;</em></ins></span> even if the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
-    a Facebook account. According</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>those 
companies</em></ins></span> and <span class="inserted"><ins><em>those
+    organizations&lt;/a&gt;.  It's actually</em></ins></span> some
+      <span class="removed"><del><strong>are starting to 
realize</strong></del></span> <span class="inserted"><ins><em>widely used 
libraries</em></ins></span> that <span class="removed"><del><strong>it is 
nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span>
+    the <span class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here</em></ins></span> is <span 
class="removed"><del><strong>a typical example of
+      the attitude of the</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> proprietary software <span 
class="removed"><del><strong>industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>developer A tricks</em></ins></span>
+    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software developers B1 &hellip; B50 into making 
platforms</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
+    apps</strong></del></span>
+    <span class="inserted"><ins><em>A to mistreat</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>article, 
Zoom and Facebook
-    don't even mention this surveillance</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>their privacy policy page,
-    making this an obvious violation of people's privacy even in their
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>end user.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202003260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iOS version of Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if</em></ins></span> the 
<span class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>user doesn't have
+    a Facebook account. According to</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>article, Zoom</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation</em></ins></span> of <span 
class="inserted"><ins><em>people's privacy even in their
     own terms.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1475,111 +1523,130 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
+    estimates</em></ins></span> whether the <span 
class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user 
has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202001290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202001290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
+    &lt;p&gt;The Amazon Ring</em></ins></span> app <span 
class="inserted"><ins><em>does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    surveillance</em></ins></span> for <span class="removed"><del><strong>use 
by companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked the user to
+      approve sending personal data to the</strong></del></span> <span 
class="inserted"><ins><em>ToToc messaging</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
+      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>seems</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
<span class="inserted"><ins><em>be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that is a good
-    reason to use free</em></ins></span> software <span 
class="removed"><del><strong>industry towards
-      those they have subjugated.&lt;/p&gt;
+    spying tool for</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and that is</em></ins></span> a 
<span class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>good
+    reason</em></ins></span> to <span class="removed"><del><strong>anyone?  
A</strong></del></span> <span class="inserted"><ins><em>use</em></ins></span> 
free software <span class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+    <span class="inserted"><ins><em>the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+  &lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps the user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>work, 
give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span>
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee,</em></ins></span> this <span class="removed"><del><strong>in a 
way that at least</strong></del></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>simply nonfree software, as fundamentally 
unjust</em></ins></span>
-    and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>dangerous</em></ins></span> as <span 
class="removed"><del><strong>what the others do.&lt;/p&gt;
+    snooping</em></ins></span> and <span class="removed"><del><strong>then 
sends personal data about them</strong></del></span> <span 
class="inserted"><ins><em>sabotage capabilities&lt;/a&gt; if they install their 
own
+    software on the device.  Many employers demand</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>any other nonfree 
software.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
+    employee, this is simply nonfree software, as fundamentally 
unjust</em></ins></span>
+    and <span class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and 
<span class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>using this
+    the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>grant</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span class="inserted"><ins><em>internet history&lt;/a&gt;, and the 
Android version was found</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>contain</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company 
based</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish</em></ins></span> in the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying that</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
-    of <span class="removed"><del><strong>whether</strong></del></span> the 
<span class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>app, and 
that, according</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span> a <span 
class="removed"><del><strong>child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>text editor) 
includes a clarification
+    saying that</em></ins></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
+  &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> app <span 
class="removed"><del><strong>because it asked the user to
-      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The <span class="inserted"><ins><em>Facebook</em></ins></span> 
app <span class="removed"><del><strong>was reporting</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
     tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>its
+    into giving</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order to use 
one</em></ins></span> of <span class="removed"><del><strong>the vibrator minute 
by
+      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1587,263 +1654,248 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
-    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
-    who have installed it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
-    it.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
+    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>proprietary
+    program is</em></ins></span> a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;The company that made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span> <span class="inserted"><ins><em>form of 
surveillance.  There is a
+    proprietary program</em></ins></span> for <span 
class="removed"><del><strong>collecting lots</strong></del></span> <span 
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or 
more</em></ins></span> people <span 
class="removed"><del><strong>used</strong></del></span>
+    <span class="inserted"><ins><em>who have installed</em></ins></span> 
it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+    <span class="removed"><del><strong>&lt;p&gt;The company's statement that 
it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold the data 
to</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;With</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data 
broker</strong></del></span> <span class="inserted"><ins><em>free program 
there</em></ins></span> would <span class="removed"><del><strong>have been able 
to figure out</strong></del></span> <span class="inserted"><ins><em>not be a 
list of</em></ins></span> who <span class="removed"><del><strong>the user 
was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company</strong></del></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+  &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of the operating system, in order to gather as much 
private</em></ins></span> data <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>pay a 
total</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
+    of <span class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>the operating system, in 
order</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    having control over the software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    users' movements even when</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>user 
says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span class="inserted"><ins><em>allow 
them</em></ins></span> access <span class="removed"><del><strong>the 
data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could 
listen</strong></del></span> to <span class="removed"><del><strong>these 
conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+  &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>companies, 
and the NSA takes advantage to spy through it too&lt;/a&gt;.
-      Here's information</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
-  &lt;li id="M201905060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;
 
-    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span> can <span class="removed"><del><strong>remotely control 
the toys with a mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;BlizzCon 2019 imposed 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This app is a</em></ins></span> spyware <span 
class="removed"><del><strong>via BIOS&lt;/a&gt; on Windows installs.
+Note</strong></del></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>can 
snoop on</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>lot of
+    sensitive data, including user's location and contact list, and 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
     
-    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span> <span 
class="inserted"><ins><em>menstrual</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
     
-    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Data collected by menstrual and 
pregnancy monitoring apps is often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
+      &lt;p&gt;Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-    data <span class="removed"><del><strong>may be
-      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>had 
sold the data</strong></del></span> <span class="inserted"><ins><em>can easily 
be
-    traced back</em></ins></span> to <span class="removed"><del><strong>a
-      data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker would have been able to figure 
out</strong></del></span> <span 
class="inserted"><ins><em>woman</em></ins></span> who <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it can 
<span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>equal 
employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span class="inserted"><ins><em>woman 
who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>do so. A
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS:</strong></del></span> <span 
class="inserted"><ins><em>women's rights to equal employment
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>do so. A
     free-software app that does more or less the same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way to access</strong></del></span> 
<span class="inserted"><ins><em>new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    spying</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span> <span class="inserted"><ins><em>you is 
available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones and iPhones
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Google tracks the movements of 
Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>data 
for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>phone has to be responsible for 
sending</em></ins></span>
-    the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have access to
+    the data, or pass it on to user-installed apps that have access to
     the network but no direct access to the data. This results in massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>top 
under each subsection</strong></del></span> <span 
class="inserted"><ins><em>which the user has absolutely no control.&lt;/p&gt;
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A study of 24 
&ldquo;health&rdquo; apps found that 19 of them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service</em></ins></span> that <span 
class="removed"><del><strong>the specific sabotage method Lenovo used did not 
affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>are difficult to understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is not <span 
class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>sufficient</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>legitimize 
snooping.&lt;/p&gt;
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Facebook offered a convenient 
proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
     way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span> 
the <span class="removed"><del><strong>emails</strong></del></span>
-    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
@@ -1851,79 +1903,36 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was</em></ins></span> in <span 
class="removed"><del><strong>Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>no hurry to take action. This proves
+    and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including 
malware</em></ins></span> in <span class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+  &lt;li id="M201902041.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Twenty nine &ldquo;beauty 
camera&rdquo; apps that used</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -2870,10 +2879,10 @@
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -2924,10 +2933,10 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
+&lt;div <span class="removed"><del><strong>style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
   &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -3018,15 +3027,19 @@
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -3057,7 +3070,7 @@
   &lt;li id="M202008030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest &lt;a
+    &lt;p&gt;Google</em></ins></span> Nest <span 
class="removed"><del><strong>Cam &ldquo;smart&rdquo; 
camera</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
     update to its speaker devices using their back door &lt;a
@@ -3072,14 +3085,16 @@
   &lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo;</em></ins></span> is <span 
class="inserted"><ins><em>malware that bosses</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, so the
     bosses can spy on them.&lt;/p&gt;
 
     &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
+    most workers into consenting to almost anything,</em></ins></span> even 
<span class="inserted"><ins><em>probable exposure
     to contagious disease that can be fatal.  Software like this should
     be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
@@ -3105,7 +3120,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    when it is not supposed to listen&lt;/a&gt;. Thus,</em></ins></span> when 
<span class="inserted"><ins><em>one of Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
@@ -4195,7 +4210,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:20 $
+$Date: 2021/02/06 12:37:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- proprietary/po/proprietary-surveillance.it.po       4 Feb 2021 11:34:20 
-0000       1.388
+++ proprietary/po/proprietary-surveillance.it.po       6 Feb 2021 12:37:53 
-0000       1.389
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -2117,6 +2117,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
 "k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
 "account\">is sending users' data to Facebook</a> even if the user doesn't "

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/proprietary-surveillance.ja-diff.html        4 Feb 2021 
11:34:20 -0000       1.248
+++ proprietary/po/proprietary-surveillance.ja-diff.html        6 Feb 2021 
12:37:53 -0000       1.249
@@ -1521,6 +1521,21 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -4076,7 +4091,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:20 $
+$Date: 2021/02/06 12:37:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- proprietary/po/proprietary-surveillance.ja.po       4 Feb 2021 11:34:20 
-0000       1.370
+++ proprietary/po/proprietary-surveillance.ja.po       6 Feb 2021 12:37:53 
-0000       1.371
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1630,6 +1630,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
 "k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
 "account\">is sending users' data to Facebook</a> even if the user doesn't "

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.309
retrieving revision 1.310
diff -u -b -r1.309 -r1.310
--- proprietary/po/proprietary-surveillance.pot 4 Feb 2021 11:34:21 -0000       
1.309
+++ proprietary/po/proprietary-surveillance.pot 6 Feb 2021 12:37:53 -0000       
1.310
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -1219,6 +1219,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a "
+"href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth\";> "
+"location tracking unknown to those companies and those organizations</a>.  "
+"It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a "
 
"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\";>is
 "
 "sending users' data to Facebook</a> even if the user doesn't have a Facebook "

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.686
retrieving revision 1.687
diff -u -b -r1.686 -r1.687
--- proprietary/po/proprietary-surveillance.ru.po       4 Feb 2021 16:31:46 
-0000       1.686
+++ proprietary/po/proprietary-surveillance.ru.po       6 Feb 2021 12:37:54 
-0000       1.687
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1741,6 +1742,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/";
 "k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
 "account\">is sending users' data to Facebook</a> even if the user doesn't "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary/po/proprietary.de-diff.html     4 Feb 2021 11:34:21 -0000       
1.225
+++ proprietary/po/proprietary.de-diff.html     6 Feb 2021 12:37:54 -0000       
1.226
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,18 +137,18 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -224,6 +224,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,18 +287,6 @@
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -347,7 +350,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:21 $
+$Date: 2021/02/06 12:37:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary/po/proprietary.de.po    4 Feb 2021 11:34:21 -0000       1.261
+++ proprietary/po/proprietary.de.po    6 Feb 2021 12:37:54 -0000       1.262
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -539,17 +554,6 @@
 "\">GNU Jami</a>, which is free software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- proprietary/po/proprietary.es.po    5 Feb 2021 10:10:01 -0000       1.396
+++ proprietary/po/proprietary.es.po    6 Feb 2021 12:37:54 -0000       1.397
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -341,6 +342,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -419,24 +435,6 @@
 "En vez de WhatsApp puede utilizar <a href=\"https://directory.fsf.org/wiki/";
 "Jami\">GNU Jami</a>, que es software libre y no recopila sus datos."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-"Muchos populares juegos para móviles están basados en el sistema "
-"<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
-"tragamonedas desde 2010. El «<cite>gacha</cite> completo» se declaró 
ilegal "
-"en Japón en 2012, pero <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\">las variantes legales siguen explotando a los "
-"usuarios</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -516,3 +514,20 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "Many popular mobile games include a random-reward system called <a href="
+#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
+#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
+#~ "variants are still <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+#~ "inordinate amounts of money on virtual toys."
+#~ msgstr ""
+#~ "Muchos populares juegos para móviles están basados en el sistema "
+#~ "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
+#~ "tragamonedas desde 2010. El «<cite>gacha</cite> completo» se declaró "
+#~ "ilegal en Japón en 2012, pero <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\">las variantes legales siguen explotando a los "
+#~ "usuarios</a>."

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.442
retrieving revision 1.443
diff -u -b -r1.442 -r1.443
--- proprietary/po/proprietary.fr.po    4 Feb 2021 17:05:41 -0000       1.442
+++ proprietary/po/proprietary.fr.po    6 Feb 2021 12:37:54 -0000       1.443
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-02-04 18:05+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -338,6 +339,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -414,25 +430,6 @@
 "org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
 "libertés numériques de l'utilisateur."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-"Beaucoup de jeux populaires sur mobiles sont basés sur un système de "
-"récompense aléatoire appelé <i>gacha</i> qui est particulièrement 
efficace "
-"sur les enfants. Une des variantes de <i>gacha</i> est illégale au Japon "
-"depuis 2012, mais <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\">les autres variantes incitent toujours les "
-"joueurs à dépenser de manière compulsive</a> des sommes extravagantes pour 
"
-"des babioles virtuelles."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -507,6 +504,24 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Many popular mobile games include a random-reward system called <a href="
+#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
+#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
+#~ "variants are still <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+#~ "inordinate amounts of money on virtual toys."
+#~ msgstr ""
+#~ "Beaucoup de jeux populaires sur mobiles sont basés sur un système de "
+#~ "récompense aléatoire appelé <i>gacha</i> qui est particulièrement "
+#~ "efficace sur les enfants. Une des variantes de <i>gacha</i> est illégale "
+#~ "au Japon depuis 2012, mais <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\">les autres variantes incitent toujours les "
+#~ "joueurs à dépenser de manière compulsive</a> des sommes extravagantes "
+#~ "pour des babioles virtuelles."
+
+#~ msgid ""
 #~ "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 #~ "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
 #~ "a> list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-";

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary/po/proprietary.it-diff.html     4 Feb 2021 11:34:21 -0000       
1.237
+++ proprietary/po/proprietary.it-diff.html     6 Feb 2021 12:37:54 -0000       
1.238
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -138,18 +138,18 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -223,6 +223,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,18 +286,6 @@
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -346,7 +349,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:21 $
+$Date: 2021/02/06 12:37:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- proprietary/po/proprietary.it.po    4 Feb 2021 11:34:21 -0000       1.270
+++ proprietary/po/proprietary.it.po    6 Feb 2021 12:37:54 -0000       1.271
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -533,17 +548,6 @@
 "\">GNU Jami</a>, which is free software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary/po/proprietary.ja-diff.html     4 Feb 2021 11:34:21 -0000       
1.242
+++ proprietary/po/proprietary.ja-diff.html     6 Feb 2021 12:37:54 -0000       
1.243
@@ -28,10 +28,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,7 +56,7 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -129,7 +129,8 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -141,8 +142,7 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -166,8 +166,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -179,8 +179,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
@@ -228,6 +228,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -276,18 +291,6 @@
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -351,7 +354,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:21 $
+$Date: 2021/02/06 12:37:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary/po/proprietary.ja.po    4 Feb 2021 11:34:21 -0000       1.254
+++ proprietary/po/proprietary.ja.po    6 Feb 2021 12:37:54 -0000       1.255
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -391,17 +406,6 @@
 "\">GNU Jami</a>, which is free software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/proprietary.nl-diff.html     4 Feb 2021 11:34:21 -0000       
1.238
+++ proprietary/po/proprietary.nl-diff.html     6 Feb 2021 12:37:54 -0000       
1.239
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -223,6 +223,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,18 +286,6 @@
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -346,7 +349,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:21 $
+$Date: 2021/02/06 12:37:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary/po/proprietary.nl.po    4 Feb 2021 11:34:21 -0000       1.244
+++ proprietary/po/proprietary.nl.po    6 Feb 2021 12:37:54 -0000       1.245
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -436,17 +451,6 @@
 "\">GNU Jami</a>, which is free software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary/po/proprietary.pl-diff.html     4 Feb 2021 11:34:21 -0000       
1.255
+++ proprietary/po/proprietary.pl-diff.html     6 Feb 2021 12:37:54 -0000       
1.256
@@ -121,8 +121,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>January, 2021, the pages in this directory 
list around 500
-instances of malicious functionalities (with more than 570 references to
+&lt;p&gt;As of January, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 570 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;If you want to be notified when we add new items or make other 
changes,
@@ -166,9 +166,9 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
@@ -222,6 +222,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -270,18 +285,6 @@
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -345,7 +348,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:21 $
+$Date: 2021/02/06 12:37:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary/po/proprietary.pl.po    4 Feb 2021 11:34:21 -0000       1.237
+++ proprietary/po/proprietary.pl.po    6 Feb 2021 12:37:54 -0000       1.238
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -617,17 +632,6 @@
 "\">GNU Jami</a>, which is free software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary/po/proprietary.pot      4 Feb 2021 11:34:21 -0000       1.234
+++ proprietary/po/proprietary.pot      6 Feb 2021 12:37:54 -0000       1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a "
+"href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth\";> "
+"location tracking unknown to those companies and those organizations</a>.  "
+"It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a "
 
"href=\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/\";>to
 "
 "use a public DNS in Mainland China</a>, using software update released in "
@@ -328,17 +344,6 @@
 "software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a "
-"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
-"children. One variant of gacha was declared illegal in Japan in 2012, but "
-"the other variants are still <a "
-"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\";>
 "
-"luring players into compulsively spending</a> inordinate amounts of money on "
-"virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- proprietary/po/proprietary.pt-br.po 4 Feb 2021 11:34:21 -0000       1.384
+++ proprietary/po/proprietary.pt-br.po 6 Feb 2021 12:37:54 -0000       1.385
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-01-05 16:36-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -333,6 +333,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -396,17 +411,6 @@
 "\">Minetest</a> em vez disso. Minetest é um software livre e respeita a "
 "liberdade de computação do usuário."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.467
retrieving revision 1.468
diff -u -b -r1.467 -r1.468
--- proprietary/po/proprietary.ru.po    4 Feb 2021 16:31:46 -0000       1.467
+++ proprietary/po/proprietary.ru.po    6 Feb 2021 12:37:54 -0000       1.468
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -416,24 +432,6 @@
 "wiki/Jami\">GNU Jami</a>, это свободная программа, 
она не будет собивать "
 "ваши данные."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-"Многие популярные мобильные игры 
основаны на системе случайного "
-"вознаграждения под названием <a 
href=\"#gacha\">гача</a>, особенно "
-"действенна для детей. В 2012 году вариант с 
&ldquo;полной гачей&rdquo; в "
-"Японии объявили незаконным, но другие 
варианты по-прежнему <a href=\"https://";
-"www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-"
-"cant-shake-off-the-spectre-of-exploitation/\"> соблазняют 
игроков "
-"неконтролируемо тратить</a> немалые деньги 
на виртуальные игрушки."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -510,6 +508,23 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Many popular mobile games include a random-reward system called <a href="
+#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
+#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
+#~ "variants are still <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+#~ "inordinate amounts of money on virtual toys."
+#~ msgstr ""
+#~ "Многие популярные мобильные игры 
основаны на системе случайного "
+#~ "вознаграждения под названием <a 
href=\"#gacha\">гача</a>, особенно "
+#~ "действенна для детей. В 2012 году вариант с 
&ldquo;полной гачей&rdquo; в "
+#~ "Японии объявили незаконным, но другие 
варианты по-прежнему <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-";
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> 
соблазняют "
+#~ "игроков неконтролируемо тратить</a> 
немалые деньги на виртуальные игрушки."
+
+#~ msgid ""
 #~ "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 #~ "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
 #~ "a> list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-";

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary/po/proprietary.tr.po    5 Feb 2021 17:34:26 -0000       1.119
+++ proprietary/po/proprietary.tr.po    6 Feb 2021 12:37:55 -0000       1.120
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-02-05 18:06+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -336,6 +337,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -413,24 +429,6 @@
 "WhatsApp yerine <a href=\"https://directory.fsf.org/wiki/Jami\";>GNU Jami</a> "
 "kullanabilirsiniz, özgür bir yazılımdır ve verinizi toplamaz."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-"Çoğu gözde mobil oyun <a href=\"#gacha\"><i>gacha</i></a> adı verilen, "
-"özellikle çocuklar üzerinde etkili olan rassal ödül sistemi içerir. "
-"Gacha'nın bir biçimi 2012 yılında Japonya'da yasadışı olarak ilan 
edilmişti, "
-"ancak diğer biçimleri hala oyuncuları sanal oyuncaklara ölçüsüz 
miktarlarda "
-"parayı <a href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/";
-"japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> "
-"dürtüsel bir şekilde harcama konusunda ayartıyor</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,6 +510,24 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Many popular mobile games include a random-reward system called <a href="
+#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
+#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
+#~ "variants are still <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+#~ "inordinate amounts of money on virtual toys."
+#~ msgstr ""
+#~ "Çoğu gözde mobil oyun <a href=\"#gacha\"><i>gacha</i></a> adı verilen, 
"
+#~ "özellikle çocuklar üzerinde etkili olan rassal ödül sistemi içerir. "
+#~ "Gacha'nın bir biçimi 2012 yılında Japonya'da yasadışı olarak ilan "
+#~ "edilmişti, ancak diğer biçimleri hala oyuncuları sanal oyuncaklara "
+#~ "ölçüsüz miktarlarda parayı <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> dürtüsel bir şekilde harcama konusunda "
+#~ "ayartıyor</a>."
+
+#~ msgid ""
 #~ "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 #~ "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
 #~ "a> list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-";

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary/po/proprietary.zh-cn.po 5 Feb 2021 10:01:59 -0000       1.150
+++ proprietary/po/proprietary.zh-cn.po 6 Feb 2021 12:37:55 -0000       1.151
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2021-02-05 11:55+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-06 12:27+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -315,6 +316,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -384,22 +400,6 @@
 "不用 WhatsApp,你可以用 <a 
href=\"https://directory.fsf.org/wiki/Jami\";>GNU "
 "Jami</a>,这是一个自由软件,它不会搜集你的数据。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-"许多流行的手机游戏都带有一个叫做 <a 
href=\"#gacha\"><i>gacha</i></a> 的随机奖"
-"励系统,它对儿童特别有效。gacha 的一个衍生品种于 2012 
年在日本被判为非法,但"
-"是其他变种还在 <a 
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/";
-"japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">引"
-"诱用户成瘾性花费</a> 过度的金钱购买虚拟玩具。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +485,21 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Many popular mobile games include a random-reward system called <a href="
+#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
+#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
+#~ "variants are still <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+#~ "inordinate amounts of money on virtual toys."
+#~ msgstr ""
+#~ "许多流行的手机游戏都带有一个叫做 <a 
href=\"#gacha\"><i>gacha</i></a> 的随"
+#~ "机奖励系统,它对儿童特别有效。gacha 
的一个衍生品种于 2012 年在日本被判为非"
+#~ "法,但是其他变种还在 <a href=\"https://www.forbes.com/sites/";
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\">引诱用户成瘾性花费</a> 
过度的金钱购买虚拟玩具。"
+
+#~ msgid ""
 #~ "Most Internet connected devices in Mozilla's <a href=\"https://foundation.";
 #~ "mozilla.org/en/privacynotincluded\">&ldquo;Privacy Not Included&rdquo;</"
 #~ "a> list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-";

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary/po/proprietary.zh-tw-diff.html  4 Feb 2021 11:34:22 -0000       
1.218
+++ proprietary/po/proprietary.zh-tw-diff.html  6 Feb 2021 12:37:55 -0000       
1.219
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,18 +137,18 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -224,6 +224,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr...apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,18 +287,6 @@
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201604040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many popular mobile games include a random-reward system called
-    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
-    children. One variant of gacha was declared illegal in Japan in 2012,
-    but the other variants are still &lt;a
-    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
-    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
-    money on virtual toys.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -347,7 +350,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/04 11:34:22 $
+$Date: 2021/02/06 12:37:55 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- proprietary/po/proprietary.zh-tw.po 4 Feb 2021 11:34:22 -0000       1.224
+++ proprietary/po/proprietary.zh-tw.po 6 Feb 2021 12:37:55 -0000       1.225
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-04 11:26+0000\n"
+"POT-Creation-Date: 2021-02-06 12:27+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="
 "\"https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-";
 "dns-service-upon-hong-kong-wifi-users/\">to use a public DNS in Mainland "
@@ -506,17 +521,6 @@
 "\">GNU Jami</a>, which is free software and will not collect your data."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games include a random-reward system called <a href="
-"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
-"variant of gacha was declared illegal in Japan in 2012, but the other "
-"variants are still <a href=\"https://www.forbes.com/sites/";
-"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
-"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
-"inordinate amounts of money on virtual toys."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary/po/pt-br.po     6 Feb 2021 11:02:34 -0000       1.353
+++ proprietary/po/pt-br.po     6 Feb 2021 12:37:55 -0000       1.354
@@ -6143,6 +6143,21 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Baidu apps <a href=\"https://www.zdnet.com/article/baidus-android-apps-";

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.599
retrieving revision 1.600
diff -u -b -r1.599 -r1.600
--- proprietary/po/ru.po        6 Feb 2021 11:02:35 -0000       1.599
+++ proprietary/po/ru.po        6 Feb 2021 12:37:55 -0000       1.600
@@ -7560,6 +7560,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary/po/tr.po        6 Feb 2021 11:02:35 -0000       1.139
+++ proprietary/po/tr.po        6 Feb 2021 12:37:55 -0000       1.140
@@ -5470,6 +5470,21 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Baidu apps <a href=\"https://www.cpomagazine.com/data-privacy/sensitive-";

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary/po/zh-cn.po     6 Feb 2021 11:02:35 -0000       1.142
+++ proprietary/po/zh-cn.po     6 Feb 2021 12:37:55 -0000       1.143
@@ -5391,6 +5391,21 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Baidu apps <a href=\"https://www.cpomagazine.com/data-privacy/sensitive-";

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/zh-tw.po     6 Feb 2021 11:02:35 -0000       1.283
+++ proprietary/po/zh-tw.po     6 Feb 2021 12:37:55 -0000       1.284
@@ -5279,6 +5279,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Many cr...apps, developed by various companies for various organizations, do "
+"<a href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth";
+"\"> location tracking unknown to those companies and those organizations</"
+"a>.  It's actually some widely used libraries that do the tracking."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"What's unusual here is that proprietary software developer A tricks "
+"proprietary software developers B1 &hellip; B50 into making platforms for A "
+"to mistreat the end user."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-apps-";
 "caught-collecting-sensitive-user-details/\"> caught collecting sensitive "
 "personal data</a> that can be used for lifetime tracking of users, and "

Index: music/po/gdb-song.de-diff.html
===================================================================
RCS file: music/po/gdb-song.de-diff.html
diff -N music/po/gdb-song.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ music/po/gdb-song.de-diff.html      6 Feb 2021 12:37:51 -0000       1.1
@@ -0,0 +1,150 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/music/gdb-song.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.94 --&gt;
+&lt;!-- This page is derived from 
/server/standards/boilerplate.html</em></ins></span> --&gt;
+&lt;title&gt;The GDB Song
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/music/po/gdb-song.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;The GDB Song&lt;/h2&gt;
+&lt;!-- when you replace this graphics, make sure you change the link
+to also point to the correct html page.
+If you make a new graphics for this page, make sure it has
+a corresponding entry in /graphics/graphics.html --&gt;
+
+&lt;p&gt;&lt;a href="/graphics/gleesons.html"&gt;&lt;img 
src="/graphics/gleeson_head.jpg"
+alt=" [colorful rounded image of the Head of a GNU]" width="153" height="128"
+ style="float: right;" /&gt;&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;&lt;em&gt;with thanks to Joel Bion, Mark Baushke, and Lynn Slater. 
&lt;br /&gt;
+published earlier in&lt;/em&gt; &lt;a 
href="/bulletins/bull4.html#SEC11"&gt;GNU's Bulletin
+No. 4&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;strong&gt;Somebody asked us what was GDB. With apologies to Oscar 
Hammerstein
+II, Richard Rodgers, and Julie Andrews, we offered the following
+reply:&lt;/strong&gt;&lt;/p&gt;
+
+&lt;div class="lyrics"&gt;
+&lt;dl&gt;
+  &lt;dt&gt;&lt;/dt&gt;
+    &lt;dd&gt;Let's start at the very beginning, a very good place to start, 
+      &lt;p&gt;When you're learning to sing, its Do, Re, Mi; &lt;br /&gt;
+      When you're learning to code, its G, D, B. &lt;br /&gt;
+      &lt;/p&gt;
+      &lt;p&gt;(background) G, D, B. &lt;/p&gt;
+      &lt;p&gt;The first three letters just happen to be, G, D, B. &lt;/p&gt;
+      &lt;p&gt;(background) G, D, B. &lt;/p&gt;
+      &lt;p&gt;(Chorus) &lt;/p&gt;
+      &lt;dl&gt;
+        &lt;dt&gt;G!, &lt;/dt&gt;
+          &lt;dd&gt;GNU!, it's Stallman's hope, &lt;/dd&gt;
+        &lt;dt&gt;D, &lt;/dt&gt;
+          <span class="inserted"><ins><em>&lt;dd&gt;debug that rotten code, 
&lt;/dd&gt;
+        &lt;dt&gt;B, &lt;/dt&gt;</em></ins></span>
+          &lt;dd&gt;a break I set myself. &lt;/dd&gt;
+        <span class="removed"><del><strong>&lt;dt&gt;B, &lt;/dt&gt;
+          &lt;dd&gt;debug that rotten code, &lt;/dd&gt;</strong></del></span>
+        &lt;dt&gt;Run, &lt;/dt&gt;
+          &lt;dd&gt;a far, far way to go. &lt;/dd&gt;
+        &lt;dt&gt;Print, &lt;/dt&gt;
+          &lt;dd&gt;to see what you have done, &lt;/dd&gt;
+        &lt;dt&gt;Set, &lt;/dt&gt;
+          &lt;dd&gt;a patch that follows print. &lt;/dd&gt;
+        &lt;dt&gt;Quit, &lt;/dt&gt;
+          &lt;dd&gt;and recompile your code - - - &lt;/dd&gt;
+      &lt;/dl&gt;
+      &lt;p&gt;&lt;/p&gt;
+      &lt;pre&gt;That will bring it back to G,
+                              D,
+                                 B,
+                                    &lt;link&gt;&lt;/pre&gt;
+      &lt;p&gt;(Resume from the Chorus) &lt;/p&gt;
+    &lt;/dd&gt;
+&lt;/dl&gt;
+&lt;/div&gt;
+
+&lt;h4 id="license"&gt;Licensing&lt;/h4&gt;
+
+&lt;p&gt;The song on this page was originally obtained from the FSF's email 
archives
+of the GNU Project.&lt;/p&gt;
+
+&lt;p&gt;The Free Software Foundation claims no copyrights on this 
song.&lt;/p&gt;
+
+&lt;p&gt;&lt;a href="/fun/humor.html"&gt;Other humor&lt;/a&gt; in the GNU 
Humor Collection. &lt;/p&gt;
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
+href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.  There are also 
&lt;a
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+<span class="inserted"><ins><em>&lt;!-- Regarding copyright, in general, 
standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;</em></ins></span>
+
+&lt;p&gt;Copyright (C) 1999, 2000, 2001, 2013, <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2020</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
+Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 
International</em></ins></span> License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2021/02/06 12:37:51 $ $Author: gnun $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]