www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 22 Feb 2021 05:32:00 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/02/22 05:31:59

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.503&r2=1.504
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.607&r2=1.608
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.372&r2=1.373
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.689&r2=1.690
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.399&r2=1.400
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.445&r2=1.446
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.272&r2=1.273
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.603&r2=1.604
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.285&r2=1.286

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- de.po       6 Feb 2021 14:33:04 -0000       1.285
+++ de.po       22 Feb 2021 10:31:53 -0000      1.286
@@ -12804,18 +12804,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -13619,6 +13621,22 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr " "
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- es.po       7 Feb 2021 10:59:45 -0000       1.405
+++ es.po       22 Feb 2021 10:31:53 -0000      1.406
@@ -13256,52 +13256,22 @@
 msgstr "Añadidos recientes"
 
 #. type: Content of: <div><ul><li><p>
-# | As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-# | 
href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\";>forcing
-# | its users to [-share-] {+hand over+} sensitive personal data</a> [-with-]
-# | {+to+} its parent company. This increases Facebook's power over users, and
-# | further jeopardizes people's privacy and security.
-#, fuzzy
-#| msgid ""
-#| "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
-#| "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-#| "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
-#| "its users to share sensitive personal data</a> with its parent company. "
-#| "This increases Facebook's power over users, and further jeopardizes "
-#| "people's privacy and security."
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
-"Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">obligando a "
-"sus usuarios a proporcionar datos personales sensibles</a> con su empresa "
-"matriz. Esto aumenta el poder de Facebook sobre sus usuarios, comprometiendo "
-"aún más la privacidad y seguridad la gente."
 
 #. type: Content of: <div><ul><li><p>
-# | [-People-]{+Instead of WhatsApp you+} can [-play-] {+use+} <a
-# | [-href=\"https://directory.fsf.org/wiki/Minetest\";>Minetest</a> instead.
-# | Minetest-] {+href=\"https://directory.fsf.org/wiki/Jami\";>GNU Jami</a>,
-# | which+} is free software and [-respects the user's computer freedom.-]
-# | {+will not collect your data.+}
-#, fuzzy
-#| msgid ""
-#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest";
-#| "\">Minetest</a> instead. Minetest is free software and respects the "
-#| "user's computer freedom."
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
-"Se puede jugar a <a href=\"https://directory.fsf.org/wiki/Minetest";
-"\">Minetest</a> en su lugar. Minetest es software libre y respeta la "
-"libertad computacional del usuario."
 
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -14078,6 +14048,54 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
 "\">#SpywareInTelephones</a>)</span>"
 
+#. type: Content of: <div><div><ul><li><p>
+# | As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
+# | 
href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\";>forcing
+# | its users to [-share-] {+hand over+} sensitive personal data</a> [-with-]
+# | {+to+} its parent company. This increases Facebook's power over users, and
+# | further jeopardizes people's privacy and security.
+#, fuzzy
+#| msgid ""
+#| "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#| "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#| "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#| "its users to share sensitive personal data</a> with its parent company. "
+#| "This increases Facebook's power over users, and further jeopardizes "
+#| "people's privacy and security."
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
+"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+"share-your-data-with-facebook-or-well-deactivate-your-account/\">obligando a "
+"sus usuarios a proporcionar datos personales sensibles</a> con su empresa "
+"matriz. Esto aumenta el poder de Facebook sobre sus usuarios, comprometiendo "
+"aún más la privacidad y seguridad la gente."
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-People-]{+Instead of WhatsApp you+} can [-play-] {+use+} <a
+# | [-href=\"https://directory.fsf.org/wiki/Minetest\";>Minetest</a> instead.
+# | Minetest-] {+href=\"https://directory.fsf.org/wiki/Jami\";>GNU Jami</a>,
+# | which+} is free software and [-respects the user's computer freedom.-]
+# | {+will not collect your data.+}
+#, fuzzy
+#| msgid ""
+#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest";
+#| "\">Minetest</a> instead. Minetest is free software and respects the "
+#| "user's computer freedom."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"Se puede jugar a <a href=\"https://directory.fsf.org/wiki/Minetest";
+"\">Minetest</a> en su lugar. Minetest es software libre y respeta la "
+"libertad computacional del usuario."
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr "iCosas"

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.503
retrieving revision 1.504
diff -u -b -r1.503 -r1.504
--- fr.po       6 Feb 2021 16:22:45 -0000       1.503
+++ fr.po       22 Feb 2021 10:31:54 -0000      1.504
@@ -11314,28 +11314,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
-"À compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">force ses "
-"utilisateurs à communiquer des données personnelles sensibles</a> à la "
-"maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs et "
-"compromet un peu plus leur vie privée et leur sécurité."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
-"À la place de WhatsApp, vous pouvez utiliser <a 
href=\"https://directory.fsf.";
-"org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
-"libertés numériques de l'utilisateur."
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -11963,6 +11956,31 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
 "\">#SpywareInTelephones</a>)</span>"
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"À compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
+"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+"share-your-data-with-facebook-or-well-deactivate-your-account/\">force ses "
+"utilisateurs à communiquer des données personnelles sensibles</a> à la "
+"maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs et "
+"compromet un peu plus leur vie privée et leur sécurité."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"À la place de WhatsApp, vous pouvez utiliser <a 
href=\"https://directory.fsf.";
+"org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
+"libertés numériques de l'utilisateur."
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr "iTrucs"

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- it.po       6 Feb 2021 14:33:04 -0000       1.285
+++ it.po       22 Feb 2021 10:31:56 -0000      1.286
@@ -11927,18 +11927,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -12707,6 +12709,22 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
 "\">#SpywareInTelephones</a>)</span>"
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- ja.po       6 Feb 2021 14:33:04 -0000       1.293
+++ ja.po       22 Feb 2021 10:31:56 -0000      1.294
@@ -9402,18 +9402,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -10048,6 +10050,22 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
 "\">#SpywareInTelephones</a>)</span>"
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 #, fuzzy
 #| msgid "Spyware in iThings"

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- nl.po       6 Feb 2021 14:33:05 -0000       1.286
+++ nl.po       22 Feb 2021 10:31:56 -0000      1.287
@@ -8721,18 +8721,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -9326,6 +9328,22 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- pl.po       6 Feb 2021 14:33:05 -0000       1.285
+++ pl.po       22 Feb 2021 10:31:57 -0000      1.286
@@ -8221,18 +8221,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -8809,6 +8811,22 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- pot 6 Feb 2021 14:33:05 -0000       1.284
+++ pot 22 Feb 2021 10:31:57 -0000      1.285
@@ -7526,18 +7526,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #
@@ -8027,6 +8029,22 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.de-diff.html       6 Feb 2021 16:03:04 -0000       
1.167
+++ proprietary-surveillance.de-diff.html       22 Feb 2021 10:31:57 -0000      
1.168
@@ -1707,12 +1707,12 @@
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
+    various ways. If it did a good job of <span 
class="removed"><del><strong>this,</strong></del></span> <span 
class="inserted"><ins><em>this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must <span class="removed"><del><strong>demand 
release</strong></del></span> <span class="inserted"><ins><em>demand release of 
source code to the
+    Google to protect us. We must demand release of source code to the
     public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1776,15 +1776,20 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    announced an opt-in proprietary search app that</em></ins></span> it <span 
class="removed"><del><strong>could more or less
+    prevent such snooping, except</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install
     on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
+    about the users' searches that Google normally gets</em></ins></span> when 
<span class="inserted"><ins><em>they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
+    &lt;p&gt;Currently,</em></ins></span> the app <span 
class="removed"><del><strong>developers are clever
+    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
+    being pre-installed on only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> must <span 
class="removed"><del><strong>demand release</strong></del></span>
+    <span class="inserted"><ins><em>explicitly opt-in before the app takes 
effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
@@ -1858,55 +1863,18 @@
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
       <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
-      the non-premium version of <span class="removed"><del><strong>the app 
does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+      the non-premium version of the app does JavaScript injection for
+      tracking <span class="inserted"><ins><em>the user</em></ins></span> and 
<span class="removed"><del><strong>display</strong></del></span> <span 
class="inserted"><ins><em>displaying</em></ins></span> ads.&lt;/dd&gt;
   &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
-
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google's new voice messaging</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1916,113 +1884,148 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who is
-    in</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+    and suggests you circulate the picture you take according to who 
is</em></ins></span>
+    in <span class="removed"><del><strong>2015&lt;/a&gt; found that 90% 
of</strong></del></span> the <span class="removed"><del><strong>top-ranked 
gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>pictures are 
likely</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>Conditions&rdquo; that spell out
-what they</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>pictures are 
likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures</em></ins></span> are 
<span class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should 
clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>private anymore,
-    even if</em></ins></span> the <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures</em></ins></span> are <span 
class="removed"><del><strong>not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>private 
anymore,
+    even if</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201605310"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In 
addition,</em></ins></span>
-    it <span class="removed"><del><strong>collects</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's conversations to serve them 
with targeted
-    advertisements.&lt;/p&gt;
+    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>what people are listening</em></ins></span> to 
<span class="removed"><del><strong>ultrasound from beacons placed in 
stores</strong></del></span> or <span class="removed"><del><strong>played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201604250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy</em></ins></span> on <span class="removed"><del><strong>users, 
instead</strong></del></span> <span class="inserted"><ins><em>many 
sorts</em></ins></span> of <span class="removed"><del><strong>hiding 
it</strong></del></span> <span class="inserted"><ins><em>data</em></ins></span> 
in <span class="removed"><del><strong>an obscurely worded EULA.&lt;/p&gt;
+    &lt;p&gt;A pregnancy test controller application not 
only</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal
+       data to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>the 
phone,</em></ins></span> and <span class="removed"><del><strong>other companies 
from getting this personal information</strong></del></span> in <span 
class="removed"><del><strong>the first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>server 
accounts,
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>personal details of users</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps that include &lt;a
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>is not enough</strong></del></span> <span 
class="inserted"><ins><em>post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
-    legitimate, but</em></ins></span> is
-    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>that valid? 
Software developers have no right</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-    when it's actually</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are</em></ins></span> 
doing <span class="removed"><del><strong>something else.  Such a thing would be 
almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+    unrelated</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this 
point,</strong></del></span> <span class="inserted"><ins><em>the app's 
functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should not</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
+    legitimate, but is</em></ins></span> that <span 
class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
+    analyze</em></ins></span> what <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and</strong></del></span> <span class="inserted"><ins><em>doing or how.  
&ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in the first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More</em></ins></span> than 73% <span 
class="inserted"><ins><em>and 47%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android 
<span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>and iOS
-    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over</em></ins></span>
-    personal, behavioral and location information&lt;/a&gt; of their users 
<span class="removed"><del><strong>with</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span>
-    third parties.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;More than 73% and 47%</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for Android and iOS
+    respectively</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral</em></ins></span> and location <span 
class="removed"><del><strong>tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>information&lt;/a&gt; of their 
users</em></ins></span> to <span class="removed"><del><strong>completely stop 
the tracking.  This</strong></del></span>
+    <span class="inserted"><ins><em>third parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+  &lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
-    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are starting
+    to realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This 
is</em></ins></span> a <span class="removed"><del><strong>thing would be almost
+    unthinkable with free software.&lt;/p&gt;
+
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;More than 73%</strong></del></span>
+    <span class="inserted"><ins><em>typical example</em></ins></span> of the 
<span class="removed"><del><strong>most popular Android apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>attitude</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> the <span class="removed"><del><strong>app's 
functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>proprietary 
software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -2046,123 +2049,126 @@
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>granted</strong></del></span> that <span 
class="removed"><del><strong>the usual analytics tools are
   legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
-    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;</em></ins></span>
+    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+  &lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
     and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
+
+  &lt;li id="M201504060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps</em></ins></span> snoop <span 
class="removed"><del><strong>are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis 
Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other</em></ins></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span> <span class="inserted"><ins><em>the 
user has installed.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</em></ins></span> and 
<span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
+    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Simeji keyboard</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are sold.
       Some Motorola phones modify Android to
       &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
       send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> a <span 
class="inserted"><ins><em>smartphone version of Baidu's</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop</em></ins></span> on the <span 
class="removed"><del><strong>system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
+    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareOnMobiles</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The nonfree Snapchat app's 
principal purpose is</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>restrict the
+    use of data</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This is</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>addition to
-    the snooping done by the phone company,</em></ins></span> and <span 
class="inserted"><ins><em>perhaps by</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>OS in</em></ins></span>
-    the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
-
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span 
class="inserted"><ins><em>does surveillance too:</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries</em></ins></span> to <span class="removed"><del><strong>study how 
iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
+      obvious way</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps</em></ins></span> the
-      <span class="removed"><del><strong>obvious way</strong></del></span> 
<span class="inserted"><ins><em>user has installed.</em></ins></span>  &lt;a
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a
  <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
-      A more advanced</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a</em></ins></span> way <span 
class="removed"><del><strong>really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that 
at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;</em></ins></span>
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation,</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to</strong></del></span> use <span 
class="removed"><del><strong>it without having your fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>by companies&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201312270"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="inserted"><ins><em>restrict the</em></ins></span>
-    use <span class="inserted"><ins><em>of data on the user's computer, 
but</em></ins></span> it <span class="removed"><del><strong>without having your 
fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>does surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries</em></ins></span> to <span class="removed"><del><strong>tell 
whether</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="inserted"><ins><em>user's list of other people's</em></ins></span> phone 
<span class="removed"><del><strong>is snooping on
+    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
-    <span class="inserted"><ins><em>numbers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201312060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked the user to
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of</strong></del></span> <span class="inserted"><ins><em>user to
     approve sending</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
         get them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -2193,7 +2199,12 @@
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2206,11 +2217,22 @@
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>say 
whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
+    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That almost certainly</em></ins></span> means
+      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> it <span class="removed"><del><strong>still counts as 
a</strong></del></span> <span class="inserted"><ins><em>can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2234,54 +2256,35 @@
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft is imposing its
-    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
+    &lt;p&gt;Microsoft is imposing its</em></ins></span>
+    surveillance <span class="removed"><del><strong>functionality.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores</strong></del></span> <span 
class="inserted"><ins><em>game of Minecraft by &lt;a
-    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring</em></ins></span>
-    every <span class="removed"><del><strong>photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>player</em></ins></span> to <span 
class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>open an account</em></ins></span> on <span 
class="inserted"><ins><em>Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge</em></ins></span> all <span 
class="removed"><del><strong>your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>on the game</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give</em></ins></span> them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>access to people's data.&lt;/p&gt;
 
-    &lt;p&gt;(From</strong></del></span> <span 
class="inserted"><ins><em>accounts into its network,
-    which will give them access to people's data.&lt;/p&gt;
+    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.)</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
-    instead.</em></ins></span> The <span class="removed"><del><strong>iCloud 
feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup</strong></del></span> <span class="inserted"><ins><em>essential 
advantage</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>Minetest</em></ins></span> is <span 
class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>that</em></ins></span> 
it <span class="removed"><del><strong>still counts as</strong></del></span> 
<span class="inserted"><ins><em>is free
-    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>bonus,
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects</em></ins></span> the <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Xboxes and had</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
+    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>iThing is,</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;</em></ins></span>
@@ -2292,52 +2295,60 @@
   <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span>
-    is <span class="removed"><del><strong>still true</strong></del></span> 
<span class="inserted"><ins><em>found</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
+    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature for web sites to track users, 
which</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span>
+    is <span class="inserted"><ins><em>found in many proprietary games. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="removed"><del><strong>from 
iPhones for the state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tracks data on users' computers and sends</em></ins></span> it
+      <span class="removed"><del><strong>is still true in iOS 
7.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to</em></ins></span> snoop on all <span class="removed"><del><strong>the 
data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    program along with an update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, though that can 
be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>the 
state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
     information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many &lt;a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles</em></ins></span> snoop on <span 
class="removed"><del><strong>all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>their users and report</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> the
+      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2347,14 +2358,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many &lt;a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
     &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>a computer,</em></ins></span> and
       <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
@@ -2404,13 +2408,9 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
-    to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with</strong></del></span> <span 
class="inserted"><ins><em>spy through it too&lt;/a&gt;.  Here's information 
on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -2421,30 +2421,23 @@
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>they send so much data that their 
transmission is</strong></del></span> <span 
class="inserted"><ins><em>sniffs</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute 
spying</strong></del></span>
-    <span class="inserted"><ins><em>good deal</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data&lt;/a&gt;, including lots of activities 
which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    spies on every process running on a gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> with <span 
class="inserted"><ins><em>cheating.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that</strong></del></span> <span 
class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2453,243 +2446,278 @@
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop on users&lt;/a&gt; even if they meet
+    designed to snoop on users&lt;/a&gt; even if</em></ins></span> they <span 
class="removed"><del><strong>send so much data that their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by the user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
-    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;
+    design</em></ins></span> of <span class="inserted"><ins><em>the program 
running on</em></ins></span> some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>of these devices</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user susceptible to be snooped and exploited by 
crackers as
+    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708280"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span> <span class="inserted"><ins><em>many 
Internet of Stings devices allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span class="removed"><del><strong>FBI 
can remotely activate</strong></del></span> <span 
class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>GPS and microphone in Android
       phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>stings.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to 
me</em></ins></span> and <span class="removed"><del><strong>users cannot stop 
them:
       &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
-      to have GPS.)&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202006250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. 
This</em></ins></span> is <span class="inserted"><ins><em>illegal 
due</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
+    the <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span> of 
<span class="removed"><del><strong>data on the user's 
computer,</strong></del></span> <span 
class="inserted"><ins><em>1988,</em></ins></span> but <span 
class="inserted"><ins><em>they're circumventing</em></ins></span>
+    it <span class="removed"><del><strong>does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>through 
EULAs.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201901070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
+    &lt;p&gt;The moviepass app</strong></del></span> <span 
class="inserted"><ins><em>the own words of the company's
+    CTO,</em></ins></span> and <span class="removed"><del><strong>dis-service 
spy on users even</strong></del></span> <span class="inserted"><ins><em>this 
data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning</em></ins></span> more <span 
class="removed"><del><strong>than users
       expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
-before <span class="removed"><del><strong>and after 
going</strong></del></span> <span class="inserted"><ins><em>Amazon 
&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+        where they travel before</strong></del></span> <span 
class="inserted"><ins><em>intrusive ads?)</em></ins></span> and <span 
class="removed"><del><strong>after going</strong></del></span> <span 
class="inserted"><ins><em>slightly
+    lower retail prices.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M202006250"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
     &lt;/p&gt;
 
     &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
-    every <span 
class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>second of what the user is watching&lt;/a&gt;. 
This is illegal due to
-    the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO,</em></ins></span> and <span class="removed"><del><strong>email 
addresses&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
data is sold to third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book</strong></del></span> <span class="inserted"><ins><em>return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note 
that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>him,
+    is</em></ins></span> that <span class="removed"><del><strong>this article 
misuses</strong></del></span> <span class="inserted"><ins><em>it is opt-in in 
newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>words
       &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>spying 
acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+      referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;
-    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>him,
-    is that it is opt-in in newer models. But since the Vizio software is
+    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening</strong></del></span>
     <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
-    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>make 
sure</em></ins></span> it <span class="removed"><del><strong>may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
+
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>isn't spying on you is</em></ins></span>
+    to <span class="removed"><del><strong>do lots of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which 
can</em></ins></span>
-    be <span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>an old 
computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>serve 
them</strong></del></span> <span class="inserted"><ins><em>block connections to 
Vizio's servers. Or, as a last resort,
-    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;</em></ins></span>
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>personal 
data in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last 
resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+   &lt;p&gt;Verizon</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+    is <span class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before</strong></del></span> <span 
class="inserted"><ins><em>too bad that</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span class="removed"><del><strong>its 
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to 
Netflix.</em></ins></span> The <span 
class="inserted"><ins><em>Netflix</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon the same
-   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The 
Netflix</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
-   they use its search engine.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in the 
phone,</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-   &lt;p&gt;Currently, the app</strong></del></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them,</em></ins></span> and <span 
class="inserted"><ins><em>not just broadcasts and
-    cable&lt;/a&gt;. Even if</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>image is coming from</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
-    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
+    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
+        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
+    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>way to 
disable the
-    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data</strong></del></span> <span 
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span 
class="inserted"><ins><em>these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511130"&gt;
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web</em></ins></span> and <span class="inserted"><ins><em>TV 
advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
+    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
+    sounds to be picked up by proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a
-    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span class="removed"><del><strong>after the 
ride&lt;/a&gt;.&lt;/p&gt;
+    manufacturers in spying on their users: their</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
+    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track you
-    across devices.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to turn this off, but having it enabled by 
default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+  &lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
+    to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to</em></ins></span> new <span class="removed"><del><strong>voice 
messaging app</strong></del></span> <span class="inserted"><ins><em>combined 
surveillance by default.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>new combined 
surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore,</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;,</em></ins></span> even if <span 
class="removed"><del><strong>the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>it isn't a TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+  &lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on what <span class="removed"><del><strong>radio 
and TV</strong></del></span> programs 
-      <span class="removed"><del><strong>are playing nearby&lt;/a&gt;.  
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and 
even what they wanted to
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2698,39 +2726,36 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on what
-    users <span class="removed"><del><strong>post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;</em></ins></span>
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>who
-      is in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
-    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>US or some
-    other government.&lt;/p&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015</strong></del></span> <span class="inserted"><ins><em>would then 
have to give</em></ins></span> it <span class="removed"><del><strong>&lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, 
and</strong></del></span> <span class="inserted"><ins><em>the US 
or</em></ins></span> some
+      <span class="removed"><del><strong>are starting</strong></del></span>
+    <span class="inserted"><ins><em>other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not</em></ins></span> to be
-      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is 
done by free
+    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>realize that</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless</em></ins></span> it is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span class="inserted"><ins><em>done 
by free
     software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span class="removed"><del><strong>they 
present</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>third
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2738,8 +2763,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
+    snooping <span class="inserted"><ins><em>all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
@@ -2749,54 +2774,40 @@
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
-      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
-    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV will not
-    work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>attitude of</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile 
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
+    work.&rdquo;&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed 
to</em></ins></span> report <span class="removed"><del><strong>which other
+    apps</strong></del></span> <span class="inserted"><ins><em>what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+  &lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report 
which</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on</em></ins></span> other
-    <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the user <span 
class="inserted"><ins><em>watches, and the switch to turn this 
off</em></ins></span> has
+    <span class="removed"><del><strong>installed.</strong></del></span>
+    <span class="inserted"><ins><em>no effect&lt;/a&gt;.  (The fact that the 
transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy</em></ins></span> this <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
@@ -2964,18 +2975,25 @@
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
     true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who <span 
class="removed"><del><strong>the user was.&lt;/p&gt;
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers</em></ins></span> found <span class="removed"><del><strong>a way 
to access the data&lt;/a&gt;
       collected by the manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
@@ -3001,73 +3019,80 @@
   &lt;li&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
       &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
+       to report its location</strong></del></span> <span 
class="inserted"><ins><em>a way</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span>
+    conversations <span 
class="removed"><del><strong>too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>was unacceptable by 
itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but that could be a
-      misunderstanding.  However, it is certainly surveillance, at
-      least.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="removed"><del><strong>an 
unidentified site</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with</em></ins></span> a <span 
class="removed"><del><strong>back door, but that could be</strong></del></span> 
<span class="inserted"><ins><em>mobile phone. This would enable
+    crackers to listen in on</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>company 
has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in</strong></del></span> <span class="inserted"><ins><em>total of 
C$4m&lt;/a&gt; to</em></ins></span> its <span class="removed"><del><strong>own 
malware&lt;/a&gt;.
+puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 <span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;CloudPets&rdquo; toys with 
microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;While you're using a DJI 
drone</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -3075,166 +3100,150 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
   this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201502180"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many employers are using nonfree
+    software, including videoconference software, to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M202008030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 <span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;While you're using a DJI 
drone</em></ins></span>
-    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>its speaker devices 
using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>accident and Google was planning</em></ins></span> on 
<span class="removed"><del><strong>The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
-
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202009270"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that</em></ins></span> is <span 
class="inserted"><ins><em>in effect</em></ins></span> a <span 
class="inserted"><ins><em>malicious</em></ins></span>
-    surveillance <span 
class="removed"><del><strong>device.</strong></del></span> <span 
class="inserted"><ins><em>feature.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202008030"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
-    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out a software
-    update to its speaker devices using their back door &lt;a
-    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
-    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the 
<span class="removed"><del><strong>manufacturer, based on</strong></del></span> 
<span class="inserted"><ins><em>devices now listen for more
-    than just their wake words. Google says</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>software update was sent
-    out prematurely and on accident and Google was planning on disclosing
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>disclosing
     this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="inserted"><ins><em>bosses &lt;a
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span>
-    <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
+    coerce workers into installing</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its 
manufacturer</strong></del></span> <span class="inserted"><ins><em>their own 
computers&lt;/a&gt;, so the
+    bosses</em></ins></span> can <span 
class="removed"><del><strong>communicate with it,</strong></del></span> <span 
class="inserted"><ins><em>spy on them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not
+    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span class="inserted"><ins><em>not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>almost 
anything, even probable exposure
+    most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>household
+    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
+    a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and 
snoop</em></ins></span> on the <span class="removed"><del><strong>fact
+      that</strong></del></span> <span class="inserted"><ins><em>household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if the devices implemented proper
+    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
+  &lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
-    subcontractors discloses a thousand confidential voice recordings,
+    when it</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not supposed</em></ins></span> to <span 
class="inserted"><ins><em>listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> <span class="inserted"><ins><em>thousand 
confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>no
-    way to see or control what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses</em></ins></span> 
proprietary <span class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span 
class="inserted"><ins><em>software, there is no
+    way to see or control what</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;Rather than trying to better control</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>use of recordings, Google
-    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than</em></ins></span> is <span class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>necessary for 
correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends</em></ins></span>
+    it <span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span class="inserted"><ins><em>to Amazon's 
servers, which store it indefinitely. Even
+    worse, Amazon forwards</em></ins></span> it to <span 
class="removed"><del><strong>outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3246,21 +3255,24 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    and</strong></del></span> <span class="inserted"><ins><em>third-party 
companies. Thus,
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>person's voice.  It should only
-    get commands that</em></ins></span> the user <span 
class="removed"><del><strong>reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, 
where</em></ins></span> they <span class="removed"><del><strong>report even 
which page</strong></del></span> <span class="inserted"><ins><em>can be 
accessed by
+    advertising companies and government agencies. In other words,
+    deleting</em></ins></span> the <span class="removed"><del><strong>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+      send lots</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3270,108 +3282,92 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span>
+    <span class="inserted"><ins><em>collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span> 
<span class="inserted"><ins><em>likewise stored longer than necessary on the 
servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
-    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
-    even if <span class="removed"><del><strong>it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
-    advertising companies and government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>car is
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
-    collecting it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>Nest 
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span> 
the <span class="removed"><del><strong>time; it is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is</strong></del></span> <span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are</em></ins></span> made 
available to <span class="removed"><del><strong>car manufacturers, insurance 
companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is</strong></del></span> <span class="inserted"><ins><em>users' life
-    at home,</em></ins></span> not
-      <span class="removed"><del><strong>really a matter</strong></del></span> 
<span class="inserted"><ins><em>only in the present, but in the past (and, who 
knows,
-    in the future too?)&lt;/p&gt;
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>users' commands 
to the Alexa service</em></ins></span> are <span class="removed"><del><strong>an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The 
Google</em></ins></span> and <span class="removed"><del><strong>should be 
replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>Apple
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> <span class="inserted"><ins><em>Alexa service staff 
even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and</em></ins></span> other
-      <span class="removed"><del><strong>cases mentioned 
are</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;.&lt;/p&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing 
is</em></ins></span> done <span class="removed"><del><strong>by proprietary 
malware in</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in</em></ins></span>
-    the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing way of saying 
&ldquo;We won't
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>make sure the user is still
-    paying for the subscription,</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
+    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon 
device,</em></ins></span>
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
     and <span class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="removed"><del><strong>doesn't
       store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
@@ -3423,77 +3419,53 @@
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on their 
<span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>renters&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>shows that laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>will teach the 
sheeple</em></ins></span> to <span class="removed"><del><strong>get users' 
formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>find it normal 
that companies
-    monitor every aspect of</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3506,33 +3478,43 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security 
flaws. They &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
-
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>and from</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. 
They</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and 
<span class="removed"><del><strong>cable&lt;/a&gt;. Even if the image is 
coming</strong></del></span> from the <span class="removed"><del><strong>user's 
own
+    computer, the TV reports what it is. The existence of a way to
+    disable</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>this article 
misuses</em></ins></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site</em></ins></span> in <span 
class="removed"><del><strong>detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but</em></ins></span> that 
<span class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>could be a
+    &lt;p&gt;This shows</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>back door, but</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3540,11 +3522,14 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to report <span class="removed"><del><strong>what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its location to someone else and to transmit 
conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3556,8 +3541,10 @@
   &lt;li id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Toyotas will &lt;a
-    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    &lt;p&gt;New Toyotas will</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
     upload data to AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
@@ -3627,12 +3614,12 @@
     &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
     cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to a government-run platform&lt;/a&gt;. In practice,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -3765,11 +3752,11 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their users and their users' 
-      friends</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
     information, but if the state orders it to get</em></ins></span> the data
@@ -3975,20 +3962,22 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows</strong></del></span>
+      Microsoft SkyDrive allows the NSA</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
-    that don't have Facebook accounts.&lt;/p&gt;
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track visitors to those pages&lt;/a&gt;&mdash;even 
users
+    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
+
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -4004,16 +3993,13 @@
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>same sort of
-    malware</em></ins></span> to <span class="removed"><del><strong>directly 
examine users' data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
+  &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
@@ -4043,10 +4029,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;Some websites send
-    JavaScript code to <span class="removed"><del><strong>collect all the 
user's
-    input,</strong></del></span> <span class="inserted"><ins><em>collect all 
the user's input, &lt;a
+    JavaScript code to collect all the user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    can then be used to <span 
class="removed"><del><strong>reproduce</strong></del></span> <span 
class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;
@@ -4115,48 +4100,48 @@
     &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
     should realize that the software Google uses to spy on students is
     nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
     exclusively use free software&lt;/a&gt; for both education and school
-    administration. If the school is run locally, parents and 
teachers</em></ins></span>
-    can <span class="removed"><del><strong>then
-        be used to reproduce</strong></del></span> <span 
class="inserted"><ins><em>mandate their representatives at</em></ins></span> 
the <span class="removed"><del><strong>whole session&lt;/a&gt;.&lt;/p&gt;
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate</em></ins></span> the <span 
class="removed"><del><strong>whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
 <span class="inserted"><ins><em>School Board</em></ins></span> to <span 
class="removed"><del><strong>snoop on information that users have typed 
into</strong></del></span> <span class="inserted"><ins><em>refuse the
-    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>form but not
-    sent&lt;/a&gt;, in order</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>learn their identity. Some are &lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software. If
-    education is run nation-wide, they need to persuade legislators
-    (e.g., through free software organizations, political parties,
-    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
 <span class="inserted"><ins><em>public schools</em></ins></span> to <span 
class="removed"><del><strong>snoop on information that users have typed into a 
form but not
+    sent&lt;/a&gt;, in order</strong></del></span> <span 
class="inserted"><ins><em>free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash 
Player's</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
+  &lt;li id="M201507280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome makes it easy for an extension to 
do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+    &lt;p&gt;Google Chrome makes it easy for an extension</em></ins></span> to 
<span class="removed"><del><strong>learn their identity. Some 
are</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span> 
&lt;a
+    <span 
class="removed"><del><strong>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for</strong></del></span> 
<span class="inserted"><ins><em>many of them do so.&lt;/p&gt;
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506180"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash 
Player's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span>
+    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    activates microphones</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -4205,41 +4190,59 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareInDrones"&gt;Spyware in 
Drones&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span 
class="removed"><del><strong>id="SpywareInDrones"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>id="SpywareInNetworks"&gt;Spyware</em></ins></span> 
in <span class="removed"><del><strong>Drones&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Networks&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI 
is</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInNetworks"&gt;Spyware</em></ins></span> 
in <span class="removed"><del><strong>many
+    &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI is 
in many
       cases &lt;a 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareEverywhere --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>Networks&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;!-- #SpywareEverywhere</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
       &ldquo;their&rdquo; phones</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The HonorLock online exam
+    proctoring program</em></ins></span> is <span class="inserted"><ins><em>a 
surveillance tool that</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree</em></ins></span> software 
<span class="inserted"><ins><em>in order</em></ins></span> to <span 
class="removed"><del><strong>make sure they can't 
&ldquo;fool&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>get an education.&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202009070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;While the world</em></ins></span> is <span 
class="inserted"><ins><em>still
-    struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    &lt;p&gt;While</em></ins></span> the 
+      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
     are in danger of surveillance&lt;/a&gt; and their computers are infected
-    with malware as a result of installing</em></ins></span> proprietary <span 
class="removed"><del><strong>software to make sure they can't 
&ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+    with malware as a result of installing proprietary 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
@@ -4373,7 +4376,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 16:03:04 $
+$Date: 2021/02/22 10:31:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- proprietary-surveillance.de.po      6 Feb 2021 14:33:05 -0000       1.378
+++ proprietary-surveillance.de.po      22 Feb 2021 10:31:57 -0000      1.379
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5766,6 +5766,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary-surveillance.es.po      7 Feb 2021 10:59:46 -0000       1.157
+++ proprietary-surveillance.es.po      22 Feb 2021 10:31:57 -0000      1.158
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2021-02-07 11:21+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -5214,6 +5215,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.607
retrieving revision 1.608
diff -u -b -r1.607 -r1.608
--- proprietary-surveillance.fr.po      6 Feb 2021 16:31:37 -0000       1.607
+++ proprietary-surveillance.fr.po      22 Feb 2021 10:31:57 -0000      1.608
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2021-02-06 17:22+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -5230,6 +5231,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary-surveillance.it-diff.html       6 Feb 2021 16:03:04 -0000       
1.233
+++ proprietary-surveillance.it-diff.html       22 Feb 2021 10:31:57 -0000      
1.234
@@ -630,40 +630,16 @@
   &lt;li id="M201509220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>not really clean 
since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts</em></ins></span> in <span class="removed"><del><strong>stores or played 
by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
-    own malware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -682,179 +658,93 @@
   &lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude</strong></del></span> 
<span class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries) 
is &lt;a
+    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
     
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users</em></ins></span> to <span class="removed"><del><strong>transmit 
users'</strong></del></span> <span class="inserted"><ins><em>hand over 
sensitive</em></ins></span> personal
-       <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span> <span 
class="inserted"><ins><em>its parent
+    its users to hand over sensitive personal data&lt;/a&gt; to its parent
     company. This increases Facebook's power over users, and further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
-    &lt;p&gt;Instead</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
<span class="inserted"><ins><em>WhatsApp you can use</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Jami"&gt;GNU 
Jami&lt;/a&gt;, which</em></ins></span> is
-    <span class="inserted"><ins><em>free software and will</em></ins></span> 
not <span class="removed"><del><strong>enough
-to legitimize actions</strong></del></span> <span 
class="inserted"><ins><em>collect your data.&lt;/p&gt;
+    &lt;p&gt;Instead of WhatsApp you can use &lt;a
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
+    free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Most apps are malware, but
-    Trump's campaign app,</em></ins></span> like <span 
class="removed"><del><strong>this.  At this point, most</strong></del></span> 
<span class="inserted"><ins><em>Modi's campaign app, is &lt;a
+    Trump's campaign app, like Modi's campaign app, is &lt;a
     
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects</strong></del></span> <span 
class="inserted"><ins><em>as well
-    as snooping</em></ins></span> on <span class="removed"><del><strong>users, 
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>them 
itself&lt;/a&gt;.&lt;/p&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
-    approach, but that does not tell us whether</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy,</strong></del></span> 
<span class="inserted"><ins><em>has functionalities</em></ins></span> we <span 
class="removed"><del><strong>must prevent Google
-and other companies from getting this personal information 
in</strong></del></span>
-    <span class="inserted"><ins><em>consider malicious, such as sending 
data</em></ins></span> the <span class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user 
has not explicitly
-    asked to send.&lt;/p&gt;</em></ins></span>
+    approach, but that does not tell us whether it has functionalities we
+    consider malicious, such as sending data the user has not explicitly
+    asked to send.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
+  &lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is
-    <span class="removed"><del><strong>yet another example of 
nonfree</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary</em></ins></span> software <span 
class="removed"><del><strong>pretending</strong></del></span> to <span 
class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+  &lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>off, 
listen</em></ins></span> to the <span class="removed"><del><strong>app's 
functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read</em></ins></span> the <span class="removed"><del><strong>usual 
analytics tools are
-  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no 
right</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;</em></ins></span>
+    read the contact list. This malware is designed to disguise itself
+    from investigation.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
+  &lt;li id="M201311120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is</em></ins></span> not 
<span class="inserted"><ins><em>much
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
     detail here, it seems that this does not operate via
     the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+  &lt;li id="M201307000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Portable</em></ins></span> phones <span 
class="removed"><del><strong>modify Android to</strong></del></span> <span 
class="inserted"><ins><em>with GPS</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will</em></ins></span> send <span class="removed"><del><strong>personal 
data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span> <span class="inserted"><ins><em>their GPS 
location</em></ins></span> on <span class="removed"><del><strong>the 
system.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>remote 
command, and users cannot stop
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location on remote command, and users cannot stop
     them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;</em></ins></span>
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareIniThings"&gt;iThings&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareIniThings"&gt;iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202009183"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops</em></ins></span>
-    on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app</strong></del></span> <span 
class="inserted"><ins><em>Instagram&lt;/a&gt; users by surreptitously 
turning</em></ins></span> on <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>the device's
+    &lt;p&gt;Facebook &lt;a
+    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -862,74 +752,47 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice of surreptitiously activating the Siri software 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
-    &lt;p&gt;His job was to listen to these recordings, in</em></ins></span> a 
<span class="removed"><del><strong>server every phone 
number</strong></del></span> <span class="inserted"><ins><em>group that made
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
     transcripts of them. He does not believes that Apple has ceased this
     practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way to prevent this is, for the 
program</em></ins></span> that
-    <span class="inserted"><ins><em>controls access to the microphone to 
decide when</em></ins></span> the user <span class="removed"><del><strong>types 
into it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>has
-    &ldquo;activated&rdquo; any service, to be free software, 
and</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot</strong></del></span>
-    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could</em></ins></span> make <span 
class="removed"><del><strong>an</strong></del></span>
-    <span class="inserted"><ins><em>sure</em></ins></span> Apple <span 
class="removed"><del><strong>ID</strong></del></span> <span 
class="inserted"><ins><em>can't listen to them.&lt;/p&gt;
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>check URLs that possibly correspond to
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list</em></ins></span> most <span 
class="removed"><del><strong>popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>certainly
-    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+  &lt;li id="M201905280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In spite of</em></ins></span> Apple's <span 
class="removed"><del><strong>servers all the photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>supposed commitment</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits you make</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers 
that</em></ins></span> are <span class="removed"><del><strong>automatically 
updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>busy 
at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.)</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
-    Intuit’s Mint, Nike, Spotify,</em></ins></span> The <span 
class="removed"><del><strong>iCloud feature is
-      &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>Washington Post, The Weather
-    Channel (owned</em></ins></span> by <span 
class="inserted"><ins><em>IBM),</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+    Intuit’s Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
     and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
@@ -999,7 +862,7 @@
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
     &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please</em></ins></span>
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
@@ -1010,14 +873,8 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
@@ -1050,13 +907,11 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores</em></ins></span> determine exactly where 
the iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
+  &lt;li id="M201312300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -1077,67 +932,40 @@
   &lt;li id="M201210170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+  &lt;li id="M201204280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
-    to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202012070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Baidu apps were</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
-    caught collecting sensitive personal data&lt;/a&gt; that</em></ins></span> 
can <span class="removed"><del><strong>take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable</strong></del></span> <span 
class="inserted"><ins><em>be used for
-    lifetime tracking of users, and putting</em></ins></span> them <span 
class="inserted"><ins><em>in danger. More than 1.4
+    &lt;p&gt;Baidu apps were &lt;a
+    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
+    caught collecting sensitive personal data&lt;/a&gt; that can be used for
+    lifetime tracking of users, and putting them in danger. More than 1.4
     billion people worldwide are affected by these proprietary apps, and
     users' privacy is jeopardized by this surveillance tool. Data collected
-    by Baidu may be handed over</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> the <span 
class="inserted"><ins><em>Chinese government, possibly
+    by Baidu may be handed over to the Chinese government, possibly
     putting Chinese people in danger.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1153,19 +981,18 @@
   &lt;li id="M202004300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Xiaomi</em></ins></span> phones
-      <span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Xiaomi phones &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
     many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
     visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
-    &lt;p&gt;Other nonfree programs snoop too. For instance, 
Spotify</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span>
-    <span class="inserted"><ins><em>other streaming dis-services make a 
dossier about each user, and &lt;a
+    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services make a dossier about each user, and &lt;a
     href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves</em></ins></span> to <span 
class="inserted"><ins><em>pay&lt;/a&gt;.  Out, out, damned Spotify!&lt;/p&gt;
+    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location 
data</strong></del></span> <span class="inserted"><ins><em>same wrongs when the 
culprits are not Chinese,
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
     but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1174,7 +1001,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1182,12 +1009,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -1214,35 +1039,25 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+  &lt;li id="M201507030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some
-      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;</em></ins></span>
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
@@ -1252,33 +1067,25 @@
   &lt;li id="M201308010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in Android phones</em></ins></span> (and Windows? 
laptops): The Wall Street
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+  &lt;li id="M201307280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    by Google, use a modified version of Android that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+  &lt;li id="M201307250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A Motorola phone &lt;a
@@ -1293,16 +1100,14 @@
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
-    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1312,81 +1117,48 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>some of its phones. The app will give Verizon the 
same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="removed"><del><strong>spyware 
is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user</strong></del></span> data to <span class="removed"><del><strong>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>Adobe&lt;/a&gt;.  
Adobe's &ldquo;excuse&rdquo;: it's
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not</em></ins></span> only
-  <span class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>the Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>phone, and</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1400,45 +1172,25 @@
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After</em></ins></span>
-    a <span class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>public outburst, Microsoft stated 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
-    would remove this capability&lt;/a&gt;. Let's hope 
so.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    snoop on each employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that &lt;a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912190"&gt;
+  &lt;li id="M201912190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;</em></ins></span>
-    snoop on <span class="removed"><del><strong>what 
radio</strong></del></span> <span class="inserted"><ins><em>users' detailed 
browsing habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="removed"><del><strong>TV programs</strong></del></span> <span 
class="inserted"><ins><em>Google
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
     removed the problematic extensions from their stores, but this shows
-    once more how unsafe nonfree software can be. Tools that</em></ins></span> 
are <span class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on what 
users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span>
-    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>protect a proprietary system are, instead, infecting 
it with
-    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>original malware).&lt;/p&gt;
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
@@ -1446,13 +1198,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
@@ -1470,33 +1222,23 @@
     &lt;p&gt;Many cr&hellip;apps, developed by various
     companies for various organizations, do &lt;a
     
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown</em></ins></span> to <span 
class="inserted"><ins><em>those companies and those
-    organizations&lt;/a&gt;.  It's actually</em></ins></span> some
-      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span class="inserted"><ins><em>widely used 
libraries that do</em></ins></span>
-    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>tracking.&lt;/p&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
 
     &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A</em></ins></span> to <span class="removed"><del><strong>be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>mistreat</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>end user.&lt;/p&gt;
+    A to mistreat the end user.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>Zoom &lt;a
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
     
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending</em></ins></span> users' <span 
class="removed"><del><strong>pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>data to 
Facebook&lt;/a&gt;</em></ins></span> even if the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
-    a Facebook account. According</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>article, 
Zoom and Facebook
-    don't even mention this surveillance</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>their privacy policy page,
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
     making this an obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;
   &lt;/li&gt;
@@ -1505,17 +1247,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span> <span 
class="inserted"><ins><em>cops directly&lt;/a&gt;.&lt;/p&gt;
+    estimates whether the user has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
@@ -1523,93 +1257,63 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Amazon Ring app does &lt;a
     
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
     Any nonfree program could be doing this, and that is a good
-    reason to use free</em></ins></span> software <span 
class="removed"><del><strong>industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+    reason to use free software instead.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+  &lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps the user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>work, 
give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
     software on the device.  Many employers demand to do this.  For the
-    employee,</em></ins></span> this <span class="removed"><del><strong>in a 
way that at least</strong></del></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>simply nonfree software, as fundamentally 
unjust</em></ins></span>
-    and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>dangerous</em></ins></span> as <span 
class="removed"><del><strong>what the others do.&lt;/p&gt;
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>any other nonfree 
software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users to grant it &lt;a
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and 
<span class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying that</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
-    of <span class="removed"><del><strong>whether</strong></del></span> the 
<span class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>app, and 
that, according</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
+  &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>its
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1617,8 +1321,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
@@ -1627,33 +1331,21 @@
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
     proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
-    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
-    it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+  &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of the operating system, in order to gather as much 
private</em></ins></span> data <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
@@ -1666,198 +1358,91 @@
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+  &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>companies, 
and the NSA takes advantage to spy through it too&lt;/a&gt;.
-      Here's information</strong></del></span> <span 
class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  It 
spreads distrust
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+  &lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>toys with</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span> <span 
class="inserted"><ins><em>menstrual</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-    data <span class="removed"><del><strong>may be
-      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>had 
sold the data</strong></del></span> <span class="inserted"><ins><em>can easily 
be
-    traced back</em></ins></span> to <span class="removed"><del><strong>a
-      data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker would have been able to figure 
out</strong></del></span> <span 
class="inserted"><ins><em>woman</em></ins></span> who <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>equal 
employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>new 
one is being developed&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones and iPhones
-    running Google apps,</em></ins></span> and <span 
class="inserted"><ins><em>sometimes &lt;a
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>data for 
years&lt;/a&gt;.&lt;/p&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>be responsible for 
sending
-    the location data</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+  &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Many Android phones come with a 
huge number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>to user-installed 
apps</em></ins></span> that <span class="inserted"><ins><em>have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>the data. This results in massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>top 
under each subsection</strong></del></span> <span 
class="inserted"><ins><em>which the user has absolutely no control.&lt;/p&gt;
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A study of 24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="inserted"><ins><em>is buried in
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
     lengthy terms of service that are difficult to understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
@@ -1872,8 +1457,8 @@
     way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one</em></ins></span> can <span 
class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span> 
the <span class="removed"><del><strong>emails</strong></del></span>
-    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
@@ -1881,68 +1466,38 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was</em></ins></span> in <span 
class="removed"><del><strong>Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>no hurry to take action. This proves
+    and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including 
malware</em></ins></span> in <span class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
 
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+  &lt;li id="M201902041.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Twenty nine &ldquo;beauty 
camera&rdquo; apps that used</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>users, and redirecting
+    pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
@@ -2395,7 +1950,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
+    A study</em></ins></span> in 2015&lt;/a&gt; found that 90% of the 
top-ranked gratis proprietary
     Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
@@ -2406,26 +1961,53 @@
     is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201505060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
-  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li id="M201504060"&gt;
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="removed"><del><strong>can collude to transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>(but not 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Widely used &lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
+    &lt;p&gt;Widely used</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>user&lt;/a&gt;. 
This is in addition to</em></ins></span>
+    the <span class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>snooping done by</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="inserted"><ins><em>whether the app developers
+    get</em></ins></span> users <span class="removed"><del><strong>is not 
enough</strong></del></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>say 
&ldquo;I agree&rdquo;. That is no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2433,16 +2015,17 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
+    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    is doing this in a way</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>at least is 
visible</em></ins></span> and <span class="removed"><del><strong>honestly 
identify</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
+    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>others 
do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    &lt;p&gt;The Simeji keyboard is a smartphone version</em></ins></span> of 
<span class="removed"><del><strong>hiding</strong></del></span> <span 
class="inserted"><ins><em>Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2451,35 +2034,61 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
+    use of data on the user's computer, but</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>does 
surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
+    it tries</em></ins></span> to <span class="removed"><del><strong>truly 
protect people's privacy, we must prevent Google
+and other companies from getting this personal information 
in</strong></del></span> <span class="inserted"><ins><em>get</em></ins></span> 
the <span class="removed"><del><strong>first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>user's list</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app would not.&lt;/p&gt;
+    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>user to
+    approve sending personal data</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.</strong></del></span> <span 
class="inserted"><ins><em>app developer but did not ask
+    about sending it to other companies.</em></ins></span>  This <span 
class="removed"><del><strong>is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>shows the weakness</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending to 
obey</strong></del></span>
+    the <span class="removed"><del><strong>user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+    surveillance: why should</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
+    unthinkable with</strong></del></span> <span 
class="inserted"><ins><em>flashlight app send any information to
+    anyone? A</em></ins></span> free <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software flashlight app would 
not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212100"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of 
the</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;FTC says</em></ins></span> most <span 
class="removed"><del><strong>popular Android</strong></del></span> <span 
class="inserted"><ins><em>mobile</em></ins></span> apps <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to the app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2491,7 +2100,10 @@
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    &lt;p&gt;Skype refuses</em></ins></span> to say
+  <span class="removed"><del><strong>&ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
@@ -2505,7 +2117,8 @@
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    specifically</em></ins></span> for <span 
class="removed"><del><strong>granted that the usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2519,65 +2132,107 @@
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft is imposing its
+    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>imposing its
     surveillance on the game of Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    every player</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
     has bought the game and will merge all accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is that it is free
+    instead. The essential advantage of Minetest is</em></ins></span> that 
<span class="removed"><del><strong>snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it is free
     software, meaning it respects the user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;
+    it offers more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not</strong></del></span>
 
-  &lt;li id="M201908210"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
-    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
+      connect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>the recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
+    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span>
+    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude</em></ins></span> on <span class="removed"><del><strong>the 
average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201806240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>a spyware that
+    is found</em></ins></span> in <span class="removed"><del><strong>some 
Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>many proprietary games. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804144"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    &lt;p&gt;ArenaNet surreptitiously installed</em></ins></span> a <span 
class="inserted"><ins><em>spyware
     program along with an update to the massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>any file</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201711070"&gt;
+
+&lt;!-- #SpywareOnMobiles</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The driver for a certain gaming 
keyboard &lt;a
     
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    information</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many &lt;a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Many</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users and report</em></ins></span> to 
<span class="removed"><del><strong>tell whether</strong></del></span> the <span 
class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal</strong></del></span>
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
     &lt;p&gt;A game console is a computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;
@@ -2595,22 +2250,49 @@
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+    &lt;p&gt;They use this</em></ins></span> data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>manipulate people 
to buy things, and hunt for
+    &ldquo;whales&rdquo; who</em></ins></span> can
+        <span class="removed"><del><strong>get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
 <span class="inserted"><ins><em>be led to spend</em></ins></span> a <span 
class="removed"><del><strong>server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>lot of 
money. They also
+    use a back door to manipulate</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>game play</em></ins></span> for <span 
class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even</strong></del></span> <span class="inserted"><ins><em>specific 
players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes</em></ins></span> gratis <span 
class="removed"><del><strong>apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>games, games that cost money
+    can use</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> the <span class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
+    to <span class="removed"><del><strong>date</strong></del></span> <span 
class="inserted"><ins><em>spy through it too&lt;/a&gt;.  Here's 
information</em></ins></span> on <span class="removed"><del><strong>all your 
devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -2621,12 +2303,23 @@
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="inserted"><ins><em>a hidden
+    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on</em></ins></span> a <span 
class="removed"><del><strong>way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span> <span class="inserted"><ins><em>gamer's 
computer and sniffs</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
+    <span class="inserted"><ins><em>good deal</em></ins></span> of <span 
class="removed"><del><strong>this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span 
class="inserted"><ins><em>personal data&lt;/a&gt;, including 
lots</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed</strong></del></span> <span 
class="inserted"><ins><em>activities which
+    have nothing</em></ins></span> to <span class="removed"><del><strong>break 
Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>do with 
cheating.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2646,37 +2339,82 @@
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop on users&lt;/a&gt; even if they meet
+    designed</em></ins></span> to <span class="removed"><del><strong>get at 
them, but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the user susceptible to be snooped and exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;
+    design</em></ins></span> of <span class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> the <span 
class="inserted"><ins><em>program running on some of these 
devices</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There is also a feature for web 
sites</strong></del></span> <span class="inserted"><ins><em>user 
susceptible</em></ins></span> to <span class="removed"><del><strong>track 
users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that 
can</strong></del></span> be
+      <span class="removed"><del><strong>turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>snooped</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
+    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    to</em></ins></span> snoop on <span class="inserted"><ins><em>the people 
that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all the <span 
class="removed"><del><strong>data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="inserted"><ins><em>unfortunate that the article uses</em></ins></span> 
the <span class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>turn the phones
+      on</strong></del></span> <span 
class="inserted"><ins><em>me</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -2685,125 +2423,254 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;TV manufacturers are able to &lt;a
     
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal due to
-    the Video Privacy Protection Act of 1988, but they're circumventing
+    every second of what</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>user is watching&lt;/a&gt;.</em></ins></span> This 
<span class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>illegal due</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data that their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by</strong></del></span>
+    the <span class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>Video Privacy 
Protection Act</em></ins></span> of <span class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that
+      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>own words 
of</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>company's
+    CTO,</em></ins></span> and <span 
class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>this data is sold to third parties. This 
is</em></ins></span> in <span class="removed"><del><strong>Android
+      phones</strong></del></span> <span class="inserted"><ins><em>return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect</strong></del></span> <span class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
+    &lt;p&gt;What is supposed to make</em></ins></span> this <span 
class="removed"><del><strong>means Windows laptops.)  
Here</strong></del></span> <span class="inserted"><ins><em>spying acceptable, 
according to him,</em></ins></span>
+    is
+      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> it <span 
class="removed"><del><strong>will eventually require</strong></del></span> 
<span class="inserted"><ins><em>is opt-in in newer models. But since the Vizio 
software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
+    and there is no guarantee that</em></ins></span> all <span 
class="removed"><del><strong>new portable phones</strong></del></span> <span 
class="inserted"><ins><em>future updates will leave the
     settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
+    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>make sure it 
isn't spying on you</em></ins></span> is
+    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="inserted"><ins><em>Internet, and</em></ins></span> use <span 
class="removed"><del><strong>of data on the user's computer, but it does 
surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span> <span class="inserted"><ins><em>a 
terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
+    if you are technically oriented, is</em></ins></span> to get <span 
class="removed"><del><strong>the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>your own router (which can
     be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+    firewall</em></ins></span> to <span class="removed"><del><strong>do lots 
of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>block connections</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article for the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+    is <span class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before</strong></del></span> <span 
class="inserted"><ins><em>too bad that</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The 
Netflix</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in the 
phone,</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
+    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
+        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
+    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511130"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
+    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
+    sounds to be picked up by proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a
-    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
-    across devices.&lt;/p&gt;
+    manufacturers in spying on their users: their</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent</strong></del></span>
+    across <span class="removed"><del><strong>the wire</strong></del></span> 
<span class="inserted"><ins><em>devices.&lt;/p&gt;
+
+    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>turn this off, but 
having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
+    to the <span class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
+    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps the user has
+    installed.</strong></del></span>
 
-  &lt;li id="M201505290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
+    used <span class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to make its 
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2813,41 +2680,51 @@
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or some
+    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> 
<span class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
-    software in your own computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to
+      <span class="removed"><del><strong>the snooping</strong></del></span> 
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done 
by <span class="removed"><del><strong>the phone company, and perhaps by the 
OS</strong></del></span> <span class="inserted"><ins><em>free
+    software</em></ins></span> in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    data containing sensitive information will</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get
+      users</strong></del></span> <span 
class="inserted"><ins><em>transmitted</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014, but we don't expect</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to
+      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>get users' formal
+    consent before collecting</em></ins></span> personal data <span 
class="inserted"><ins><em>are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
-    work.&rdquo;&lt;/p&gt;
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>TV will</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
+    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
@@ -2858,20 +2735,22 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+    reports what the user watches, and the switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    do lots</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
@@ -2879,24 +2758,31 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
@@ -2905,46 +2791,67 @@
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    see</em></ins></span> through <span class="removed"><del><strong>it 
too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201511250"&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Nest Cam</em></ins></span> 
&ldquo;smart&rdquo; <span class="removed"><del><strong>toys My Friend Cayla and 
i-Que transmit</strong></del></span> <span class="inserted"><ins><em>camera 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    even when</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2955,9 +2862,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+    into <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
@@ -2965,12 +2873,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
@@ -3000,70 +2910,146 @@
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201612060"&gt;
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    can remotely control the toys with</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>mobile phone. This would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak 
into</em></ins></span> the <span class="removed"><del><strong>emails of members 
of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;While you're using a DJI 
drone</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -3079,120 +3065,85 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google</em></ins></span> Nest <span 
class="removed"><del><strong>Cam &ldquo;smart&rdquo; 
camera</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
-    is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door &lt;a
-    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
+    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out a software
+    update to its speaker devices using their back door</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm is happening. This means the devices now listen for more
+    that an alarm is happening. This</em></ins></span> means the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>devices now listen for more
     than just their wake words. Google says the software update was sent
     out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+    this new feature and offering</em></ins></span> it to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>customers who pay for it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M202006300"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo;</em></ins></span> is <span 
class="inserted"><ins><em>malware that bosses</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy on them.&lt;/p&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>their own computers&lt;/a&gt;, so the
+    bosses</em></ins></span> can <span class="removed"><del><strong>contain 
Javascript code,</strong></del></span> <span class="inserted"><ins><em>spy on 
them.&lt;/p&gt;
 
     &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything,</em></ins></span> even 
<span class="inserted"><ins><em>probable exposure
+    most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+    be illegal</em></ins></span> and <span class="inserted"><ins><em>bosses 
that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to &lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    a security vulnerability that enabled attackers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant surveillance if the devices implemented proper
+    &lt;p&gt;Knowledge of</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>wifi 
password would not be sufficient to carry
+    out any significant surveillance if</em></ins></span> the <span 
class="removed"><del><strong>e-reader</strong></del></span> <span 
class="inserted"><ins><em>devices implemented proper
     security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used by their
+    software lack this. Of course, they are also</em></ins></span> used by 
<span class="removed"><del><strong>most US libraries,</strong></del></span> 
<span class="inserted"><ins><em>their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
-    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus,</em></ins></span> when 
<span class="inserted"><ins><em>one of Google's
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when 
one</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+    way</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>see or 
control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201905061"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener 
and</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>manufacturer is using 
it</strong></del></span> <span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the present, but</em></ins></span> in <span 
class="removed"><del><strong>many e-readers&mdash;not 
only</strong></del></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>user reads at 
what time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some</em></ins></span> of <span class="removed"><del><strong>data 
to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>users' 
commands</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3202,39 +3153,68 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>the Alexa 
service</em></ins></span> are &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf has a built-in cell 
phone modem which allows
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
-    voice assistants</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span 
class="removed"><del><strong>if it asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
-    access.  The software in the car is
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through the modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+    even if <span class="removed"><del><strong>it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>users request deletion of their data from Amazon's 
servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
+    in</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>client 
program is nonfree, and data processing is done
-    &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in</em></ins></span>
-    the <span class="removed"><del><strong>phone company</strong></del></span> 
<span class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing way of 
saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no 
way</em></ins></span>
-    to <span class="removed"><del><strong>track the car's movements all
-    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
     though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -3247,44 +3227,44 @@
       which is made available</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
-    paying for the subscription,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
-      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+    and <span 
class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine the car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information,</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this.</em></ins></span> The 
<span class="removed"><del><strong>company says it doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>job would be much
+    easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell the product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers 
too,</em></ins></span> but <span class="removed"><del><strong>if the state 
orders it</strong></del></span> <span class="inserted"><ins><em>please &lt;a
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>get the</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
@@ -3351,40 +3331,24 @@
 
 <span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span>
+don't know. You can't see out</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence of a 
way</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="removed"><del><strong>was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>normal</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>companies
-    monitor every aspect of</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3397,59 +3361,58 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt;</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>watch.&lt;/p&gt;
-
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>and from</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch, possibly endangering the child.&lt;/p&gt;
+    privacy. In addition, they have a lot of security flaws. 
They</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and 
<span class="removed"><del><strong>cable&lt;/a&gt;. Even if the image is 
coming</strong></del></span> from the <span class="removed"><del><strong>user's 
own
+    computer, the TV reports what it is. The existence of a way to
+    disable</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
+    that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>back door, but</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+  &lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else</em></ins></span> 
and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to report <span class="removed"><del><strong>what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its location to someone else and to transmit 
conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3461,17 +3424,20 @@
   &lt;li id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Toyotas will &lt;a
-    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>AWS to help 
create custom insurance premiums&lt;/a&gt;
+    &lt;p&gt;New Toyotas will</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can
-      <span class="removed"><del><strong>correlate ads</strong></del></span>
-    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If you want
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can <span 
class="removed"><del><strong>track</strong></del></span>
+    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If</em></ins></span> you 
+      <span class="removed"><del><strong>across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>want
     GPS navigation, get a separate navigator which runs free software
-    and works</em></ins></span> with <span class="removed"><del><strong>Web 
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street 
Map.&lt;/p&gt;
+    and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
@@ -3480,87 +3446,101 @@
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
     record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden</em></ins></span> and
-      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>running with
-    proprietary software.&lt;/p&gt;</em></ins></span>
+    the user, access to the data</em></ins></span> is <span 
class="removed"><del><strong>possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>nearly impossible, 
as</em></ins></span> it <span class="removed"><del><strong>enabled by 
default</strong></del></span> <span class="inserted"><ins><em>involves
+    cracking the car's computer, which</em></ins></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running</em></ins></span> with 
<span class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span> <span 
class="inserted"><ins><em>junkyard</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+  &lt;li id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network</em></ins></span> and 
<span class="removed"><del><strong>would then</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>to
-      give it to</strong></del></span> <span class="inserted"><ins><em>you 
succeeded in breaking</em></ins></span> the <span 
class="removed"><del><strong>US</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem,</em></ins></span> or <span class="removed"><del><strong>some other 
government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
+    antenna</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
-    cars</em></ins></span> to be <span class="removed"><del><strong>trusted 
unless it is done
-    by free software in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a 
terminal</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be 
transmitted</strong></del></span>
+    &lt;p&gt;In China, it is mandatory for electric
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,</em></ins></span>
-    to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+    transfers technical data, including car location,
+    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>user watches, and</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201810230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;GM &lt;a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>switch to 
turn this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could have 
got</em></ins></span> that <span class="inserted"><ins><em>easily by
-    sneaking it into</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 
error</strong></del></span> <span class="inserted"><ins><em>contract that users 
sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you</em></ins></span> really <span 
class="removed"><del><strong>means nothing;</strong></del></span> <span 
class="inserted"><ins><em>want to be safe, we must make sure</em></ins></span> 
the <span class="removed"><del><strong>server
-      could save</strong></del></span> <span class="inserted"><ins><em>car's
-    hardware cannot collect any of that data, or</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
+    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
+      transmission reports a 404 error really means nothing; the server
+      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
       &lt;p&gt;Even worse, it
       &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
@@ -3598,38 +3578,38 @@
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Users</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software</em></ins></span> are <span 
class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software</em></ins></span> are <span 
class="removed"><del><strong>suing Bose</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it 
asked</em></ins></span>
+    for <span class="inserted"><ins><em>authentication, you couldn't be 
confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>audio 
files
+users listen</strong></del></span> <span class="inserted"><ins><em>phone 
company</em></ins></span> to <span class="removed"><del><strong>along with the 
headphone's unique serial number.
 &lt;/p&gt;
 
-&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>fine print of</strong></del></span> <span 
class="inserted"><ins><em>car's movements all</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span 
class="inserted"><ins><em>time;</em></ins></span>
     it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
 illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;
@@ -3663,14 +3643,14 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data</strong></del></span>
+      collect</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information</em></ins></span> about <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>drivers' movements&lt;/a&gt;, which is made
-    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
 
     &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really a matter of proprietary surveillance. These systems
+    is not really</em></ins></span> a <span class="removed"><del><strong>wide 
range</strong></del></span> <span 
class="inserted"><ins><em>matter</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>proprietary surveillance. These systems
     are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
@@ -3780,23 +3760,20 @@
     to the page, and makes the page's URL available to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking and surveillance of 
customers,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612064"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
+    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
     businesses to show different people different prices&lt;/a&gt;. Most of
     the tracking is done by recording interactions with servers, but
     proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
+  &lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -3821,7 +3798,7 @@
     &lt;p&gt;Many web sites report all their visitors
     to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and <span 
class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the page that was visited&lt;/a&gt;.&lt;/p&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
@@ -3829,22 +3806,18 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
     of other people's phone numbers or email addresses).  This violates
-    the privacy of those other people.&lt;/p&gt;</em></ins></span>
+    the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Pages</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
+  &lt;li id="M201110040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pages</em></ins></span> that contain &ldquo;Like&rdquo; buttons 
&lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</em></ins></span>
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
     enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
     that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3856,17 +3829,14 @@
   &lt;li id="M201811270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>rat their visitors</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>advertising 
networks</strong></del></span> <span class="inserted"><ins><em>snoop on 
information</em></ins></span> that <span class="removed"><del><strong>track
-      users.  Of the top 1000 web sites,</strong></del></span> <span 
class="inserted"><ins><em>users have typed into a
-    form but not sent&lt;/a&gt;, in order to learn their identity. Some 
are</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing</strong></del></span> <span class="inserted"><ins><em>some customer 
services use the same sort of
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
     malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
     read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
@@ -3877,8 +3847,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give</em></ins></span> other
-      <span class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>companies personal data on
+    JavaScript on its web site to give other companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3894,14 +3863,20 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collect all the user's input, &lt;a
-    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    JavaScript code to collect all the user's input,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+      businesses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used</em></ins></span> to <span 
class="removed"><del><strong>show different people different prices&lt;/a&gt;. 
Most
+      of</strong></del></span> <span 
class="inserted"><ins><em>reproduce</em></ins></span> the <span 
class="removed"><del><strong>tracking is done by recording interactions with
+      servers, but proprietary software 
contributes.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
+    code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3913,9 +3888,14 @@
   &lt;li id="M201310110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash and JavaScript are used for &lt;a
-    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; 
buttons</strong></del></span> <span class="inserted"><ins><em>JavaScript are 
used for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook to track visitors</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
+      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>identify users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
@@ -3925,7 +3905,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Flash Player's &lt;a
     
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps</em></ins></span> web sites <span 
class="inserted"><ins><em>track visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps</em></ins></span> web sites <span 
class="removed"><del><strong>rat their visitors to advertising networks 
that</strong></del></span> track
+      <span class="removed"><del><strong>users.  Of the top 1000 web 
sites,</strong></del></span> <span 
class="inserted"><ins><em>visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3939,17 +3920,23 @@
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome is an &lt;a
-    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and</em></ins></span> report <span 
class="inserted"><ins><em>the sites they visit to advertising and
-    data companies, first of</em></ins></span> all <span 
class="inserted"><ins><em>to Google. Moreover, if users have a
-    Gmail account, Chrome automatically logs them in to the browser for
-    more convenient profiling. On Android, Chrome also 
reports</em></ins></span> their <span 
class="removed"><del><strong>visitors</strong></del></span>
-    <span class="inserted"><ins><em>location</em></ins></span> to <span 
class="removed"><del><strong>Google by using</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;
+    &lt;p&gt;Google Chrome is an</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
+    instrument</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade
+    users' computers and report the</em></ins></span> sites <span 
class="inserted"><ins><em>they visit</em></ins></span> to <span 
class="removed"><del><strong>track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
+  &lt;li&gt;&lt;p&gt;Many web sites report</strong></del></span> <span 
class="inserted"><ins><em>advertising and
+    data companies, first of</em></ins></span> all <span 
class="removed"><del><strong>their visitors</strong></del></span> to <span 
class="removed"><del><strong>Google by using</strong></del></span> <span 
class="inserted"><ins><em>Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to</em></ins></span> the 
<span class="removed"><del><strong>Google Analytics service, 
which</strong></del></span> <span class="inserted"><ins><em>browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.&lt;/p&gt;
+
+    &lt;p&gt;The best way to escape surveillance is to switch 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a 
modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3959,10 +3946,8 @@
     &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
     href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>Google Analytics 
service, which
-      &lt;a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google</strong></del></span> <span class="inserted"><ins><em>lack
-    of transparency on</em></ins></span> the <span 
class="removed"><del><strong>IP address</strong></del></span> <span 
class="inserted"><ins><em>part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>lack
+    of transparency on the part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
@@ -4075,16 +4060,34 @@
       &ldquo;their&rdquo; phones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program</em></ins></span> is <span class="inserted"><ins><em>a 
surveillance tool that</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree</em></ins></span> software 
<span class="inserted"><ins><em>in order</em></ins></span> to <span 
class="removed"><del><strong>make sure they can't 
&ldquo;fool&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202009070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;While the world</em></ins></span> is <span 
class="inserted"><ins><em>still
-    struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    &lt;p&gt;While</em></ins></span> the 
+      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
     are in danger of surveillance&lt;/a&gt; and their computers are infected
-    with malware as a result of installing</em></ins></span> proprietary <span 
class="removed"><del><strong>software to make sure they can't 
&ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+    with malware as a result of installing proprietary 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
@@ -4218,7 +4221,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 16:03:04 $
+$Date: 2021/02/22 10:31:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary-surveillance.it.po      6 Feb 2021 14:33:05 -0000       1.390
+++ proprietary-surveillance.it.po      22 Feb 2021 10:31:57 -0000      1.391
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5408,6 +5408,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary-surveillance.ja-diff.html       6 Feb 2021 16:03:04 -0000       
1.251
+++ proprietary-surveillance.ja-diff.html       22 Feb 2021 10:31:57 -0000      
1.252
@@ -2032,7 +2032,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
+    report which other apps the</em></ins></span> user <span 
class="removed"><del><strong>types</strong></del></span> <span 
class="inserted"><ins><em>has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
     is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
@@ -2122,17 +2122,20 @@
     surveillance on the game of Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
     every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its network,
+    has bought the game and will merge all accounts</em></ins></span> into 
<span class="removed"><del><strong>it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>its network,
     which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects the user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot 
make</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
@@ -2156,10 +2159,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    program along with</em></ins></span> an <span 
class="removed"><del><strong>Apple ID</strong></del></span> <span 
class="inserted"><ins><em>update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>install even</strong></del></span> 
<span class="inserted"><ins><em>snoop on all open processes running on its 
user's computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
@@ -2185,16 +2188,18 @@
   &lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    &lt;p&gt;Modern</em></ins></span> gratis <span 
class="removed"><del><strong>apps)&lt;/a&gt;
+      without giving</strong></del></span> <span 
class="inserted"><ins><em>game cr&hellip;apps &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    collect</em></ins></span> a <span class="removed"><del><strong>valid email 
address</strong></del></span> <span class="inserted"><ins><em>wide range of 
data about their users</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>manipulate people to buy things, and hunt for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
@@ -2214,20 +2219,25 @@
 
     &lt;p&gt;&lt;a
     
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200510200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>sniffs a
+    good deal</em></ins></span> of <span class="removed"><del><strong>their 
users</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;, including lots of activities which
+    have nothing to do</em></ins></span> with <span 
class="removed"><del><strong>third parties.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -2245,12 +2255,22 @@
     
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop on users&lt;/a&gt; even if they meet
+    designed</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers all the photos and
+      videos</strong></del></span> <span class="inserted"><ins><em>snoop on 
users&lt;/a&gt; even if</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date</strong></del></span> <span 
class="inserted"><ins><em>meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the</em></ins></span> user <span class="removed"><del><strong>types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>susceptible 
to be snooped and exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;
+    design of the program running</em></ins></span> on <span 
class="removed"><del><strong>all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>some 
of these devices</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    the user susceptible to be snooped and exploited by 
crackers</em></ins></span> as <span 
class="removed"><del><strong>accessed</strong></del></span>
+    <span class="inserted"><ins><em>well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
@@ -2258,12 +2278,18 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    to snoop</em></ins></span> on <span class="removed"><del><strong>24 Sep 
2015.) The iCloud feature</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>unfortunate that the 
article uses</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. 
The</strong></del></span> term <span 
class="removed"><del><strong>&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2273,7 +2299,12 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+&lt;p&gt;Emo Phillips made</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>joke: The other day 
a woman came up</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
@@ -2282,40 +2313,83 @@
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal due to
-    the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;
+    every second of what the user is watching&lt;/a&gt;. This is illegal 
due</em></ins></span> to <span class="removed"><del><strong>get at them, but 
NSA can access any</strong></del></span>
+    <span class="inserted"><ins><em>the Video Privacy Protection 
Act</em></ins></span> of <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>1988, but they're circumventing
+    it</em></ins></span> through <span 
class="inserted"><ins><em>EULAs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>iThings:</strong></del></span> the <span 
class="removed"><del><strong>&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>own words 
of</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>company's
+    CTO,</em></ins></span> and <span class="removed"><del><strong>get other 
info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>this data</em></ins></span> is <span 
class="removed"><del><strong>also a feature</strong></del></span> <span 
class="inserted"><ins><em>sold to third parties. This is in 
return</em></ins></span> for <span class="removed"><del><strong>web 
sites</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>server records these 
numbers</strong></del></span> <span class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV,</em></ins></span> for <span 
class="removed"><del><strong>at least 30
-        days.&lt;/p&gt;
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>track users, which</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, according to 
him,</em></ins></span>
+    is
+      <span class="removed"><del><strong>&lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> it is <span 
class="removed"><del><strong>still true</strong></del></span> <span 
class="inserted"><ins><em>opt-in</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>NSA snoop on</strong></del></span> <span 
class="inserted"><ins><em>scenes,
+    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure</em></ins></span> it <span 
class="inserted"><ins><em>isn't spying on you</em></ins></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span>
+    to <span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>disconnect it 
from</em></ins></span> the
+      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot</strong></del></span> <span 
class="inserted"><ins><em>that
-    matter), the easiest way to</em></ins></span> make <span 
class="inserted"><ins><em>sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be</em></ins></span> an <span class="removed"><del><strong>Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>old computer running completely free 
software), and set up a
-    firewall to block connections</em></ins></span> to <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,
+      &lt;a 
href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span> 
<span class="inserted"><ins><em>get your own router (which</em></ins></span> 
can <span class="removed"><del><strong>take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span class="inserted"><ins><em>be an old computer running completely free 
software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2324,47 +2398,56 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that</em></ins></span> install <span 
class="removed"><del><strong>even gratis apps)&lt;/a&gt;
-      without giving</strong></del></span> a <span 
class="removed"><del><strong>valid email address and 
receiving</strong></del></span> <span class="inserted"><ins><em>surveillance 
app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>article for 
the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> the <span 
class="removed"><del><strong>phones
+      on and off, listen to</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>facts it presents. It
+    is too bad that</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the 
<span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness of 
surrendering</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>not 
just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> is <span 
class="removed"><del><strong>a
+      substantial expense for users.  Said transmission,</strong></del></span> 
<span class="inserted"><ins><em>viewed on them, and</em></ins></span> not <span 
class="removed"><del><strong>wanted or
+      requested by</strong></del></span> <span class="inserted"><ins><em>just 
broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>image is coming 
from the user's own computer,
+    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>a way to disable</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>a way</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was</em></ins></span> in <span class="removed"><del><strong>Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that</em></ins></span> they 
<span class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo</strong></del></span>
-    <span class="inserted"><ins><em>are nearby.  Once your Internet devices 
are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span class="removed"><del><strong>video you 
take,</strong></del></span> <span class="inserted"><ins><em>other &lt;a
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware running
+    on other devices in range so as to determine</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span> <span class="inserted"><ins><em>they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2373,115 +2456,132 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a
+    manufacturers</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones</strong></del></span> <span class="inserted"><ins><em>spying on 
their users: their &lt;a
     
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span>
-    <span class="inserted"><ins><em>link</em></ins></span> them <span 
class="removed"><del><strong>up to date on all</strong></del></span> your <span 
class="removed"><del><strong>devices.
-      Any edits</strong></del></span> <span class="inserted"><ins><em>IP 
address&lt;/a&gt; so that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span>
-    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>possible to turn this off, but having it 
enabled</em></ins></span> by <span class="removed"><del><strong>the
-      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track you
+    across devices.&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>default</em></ins></span>
-    is <span class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>an injustice already.&lt;/p&gt;
+    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="removed"><del><strong>means Windows laptops.)  
Here</strong></del></span> <span class="inserted"><ins><em>off, but having it 
enabled by default</em></ins></span>
+    is
+      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511020"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable 
phones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="inserted"><ins><em>the 600 millions social media profiles 
the company
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose 
is</strong></del></span> <span class="inserted"><ins><em>Viacom adds 2.3 
million households</em></ins></span>
+    to <span class="removed"><del><strong>restrict</strong></del></span> the 
<span class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles</em></ins></span> 
the <span class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span>
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance</em></ins></span> by <span 
class="removed"><del><strong>default so</strong></del></span> <span 
class="inserted"><ins><em>default.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>get the 
user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        for</strong></del></span> <span class="inserted"><ins><em>new 
combined</em></ins></span> surveillance <span class="removed"><del><strong>is 
inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if</em></ins></span> it <span 
class="removed"><del><strong>still counts as</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs</em></ins></span> people <span 
class="removed"><del><strong>apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>watch, and even what 
they wanted</em></ins></span> to
-    <span class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops</em></ins></span> on what <span class="removed"><del><strong>radio 
and TV</strong></del></span> programs 
+      <span class="removed"><del><strong>are playing nearby&lt;/a&gt;.  Also 
on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>people watch,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
+    &lt;p&gt;Vizio</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span> <span class="inserted"><ins><em>make its TVs 
snoop on what
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>iThing is,</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to the US or 
some</em></ins></span>
-    other <span class="removed"><del><strong>info too.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not</em></ins></span> to be
+      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is 
done by free
+    software in your own computer.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>government.&lt;/p&gt;
-
-    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>also a feature for web sites</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span> <span class="inserted"><ins><em>be trusted 
unless</em></ins></span> it is <span class="removed"><del><strong>still 
true</strong></del></span> <span class="inserted"><ins><em>done by free
-    software</em></ins></span> in <span class="removed"><del><strong>iOS 
7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple</strong></del></span> <span class="inserted"><ins><em>your 
own computer.&lt;/p&gt;
-
-    &lt;p&gt;In</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span class="inserted"><ins><em>privacy policy, 
Samsung explicitly confirms</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will</em></ins></span> be
-      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>third
+    parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+  &lt;li id="M201411090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2492,240 +2592,243 @@
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span class="removed"><del><strong>NSA 
snoop</strong></del></span> <span class="inserted"><ins><em>user watches, and 
the switch to turn this off has
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+    really means nothing; the server could save</em></ins></span> that <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>user's local 
network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is nasty.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
+      &lt;p&gt;This article shows the</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude</strong></del></span> <span class="inserted"><ins><em>stop 
this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>iOS 
seem</strong></del></span> <span class="inserted"><ins><em>spying 
anyway&lt;/a&gt;.&lt;/p&gt;
+    do lots</em></ins></span> of <span class="removed"><del><strong>the 
proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in</strong></del></span>
 
-  &lt;li id="M201212170"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>break security on a 
&ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch</em></ins></span> the
-      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found</em></ins></span> a way <span 
class="removed"><del><strong>that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>use its camera to 
watch</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span class="removed"><del><strong>phones
-      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>video they capture</em></ins></span> to <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    send</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>video shows everyone 
that comes near, or merely
-    passes by,</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone 
that comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at</em></ins></span> the <span class="removed"><del><strong>contact list. 
This malware is designed</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has 
tried</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+    at</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data</strong></del></span> <span 
class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>their transmission is a
-      substantial expense for users.  Said transmission, not wanted or
-      requested by</strong></del></span>
-    <span class="inserted"><ins><em>secondary abuse, but</em></ins></span> the 
<span class="removed"><del><strong>user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly</em></ins></span> all <span 
class="inserted"><ins><em>&ldquo;home security cameras&rdquo; &lt;a
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> an <span 
class="removed"><del><strong>article blocked from us by</strong></del></span> 
<span class="inserted"><ins><em>unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS and 
microphone</strong></del></span> <span class="inserted"><ins><em>better
+    give</em></ins></span> the <span class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this</strong></del></span> <span 
class="inserted"><ins><em>the videos. That's not
-    security for your home. Security</em></ins></span> means <span 
class="removed"><del><strong>Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>making sure they don't get to
-    see through your camera.&lt;/p&gt;</em></ins></span>
+    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>videos. That's</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
+    <span class="inserted"><ins><em>security for your home. Security means 
making sure they don't get</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+  &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
+  &lt;li id="M201511250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</em></ins></span> is 
<span class="removed"><del><strong>to restrict
-      the use of data on</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>user's 
computer, but</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span>
-    to <span class="removed"><del><strong>get the user's list of other 
people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance is inadequate</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act</em></ins></span> as a 
<span class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it
     into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage to spy</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+  &lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users</em></ins></span> through <span 
class="inserted"><ins><em>the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
-      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>could have checked</em></ins></span>
-    and <span class="removed"><del><strong>Twitter.&lt;/p&gt;
+    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app</strong></del></span> 
<span class="inserted"><ins><em>changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+   &lt;li&gt;&lt;p&gt;A</strong></del></span> <span 
class="inserted"><ins><em>their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
+
+    &lt;p&gt;The</em></ins></span> company that <span 
class="removed"><del><strong>makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>made the 
vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,
-      and suggests you</strong></del></span> <span 
class="inserted"><ins><em>collecting lots of personal information about how 
people
-    used it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>picture 
you take according</strong></del></span> <span class="inserted"><ins><em>data 
broker would have been able</em></ins></span> to <span 
class="inserted"><ins><em>figure out</em></ins></span> who
-      <span class="removed"><del><strong>is in</strong></del></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt; to its
+    was</em></ins></span> sued for collecting lots of personal information 
about how people <span class="removed"><del><strong>use</strong></del></span>
+    <span class="inserted"><ins><em>used</em></ins></span> 
it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The company's statement that it <span 
class="removed"><del><strong>anonymizes</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
+    true, but it doesn't really matter. If it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>had sold</em></ins></span> the data to a data
+    broker, the data broker <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>would have been able to</em></ins></span> figure out 
who the
+    user <span class="removed"><del><strong>is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;The app reports</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>temperature</strong></del></span> 
<span class="inserted"><ins><em>company has been ordered to pay a 
total</em></ins></span> of <span class="inserted"><ins><em>C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2734,45 +2837,40 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
+    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, whether it 
is surrounded</strong></del></span> <span class="inserted"><ins><em>the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen</em></ins></span> 
to <span class="removed"><del><strong>Facebook's servers</strong></del></span> 
<span class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body),</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard</strong></del></span> <span 
class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This</em></ins></span> would <span 
class="removed"><del><strong>make statements about</strong></del></span> <span 
class="inserted"><ins><em>enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+  &lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>children</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2787,10 +2885,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2805,16 +2901,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software,</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil</em></ins></span> and <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>monitor staff working at home&lt;/a&gt;. If the 
program reports
-    whether you</em></ins></span> are <span 
class="removed"><del><strong>starting to realize</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;active,&rdquo;</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>in effect</em></ins></span> a <span 
class="removed"><del><strong>way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>malicious
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2822,227 +2912,295 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Nest &lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
-    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out</em></ins></span> a <span class="removed"><del><strong>typical example of
-      the attitude of the proprietary</strong></del></span> software <span 
class="removed"><del><strong>industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile</strong></del></span>
-    <span class="inserted"><ins><em>update to its speaker</em></ins></span> 
devices <span class="removed"><del><strong>report which other
-    apps the user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>using 
their back door</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;</em></ins></span>
 that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
-    <span class="inserted"><ins><em>listens for things like smoke 
alarms&lt;/a&gt;</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>then notifies your 
phone
-    that an alarm is happening. This means</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC</strong></del></span> <span 
class="inserted"><ins><em>devices now listen for more
-    than just their wake words. Google</em></ins></span> says <span 
class="removed"><del><strong>most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>the software update was sent
-    out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay</em></ins></span> 
for <span class="removed"><del><strong>children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update to its speaker devices using</em></ins></span> their <span 
class="removed"><del><strong>products, rather</strong></del></span> <span 
class="inserted"><ins><em>back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
+    that an alarm is happening. This means the devices now listen for 
more</em></ins></span>
+    than <span class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>just their wake words. Google says 
the</em></ins></span> software <span class="removed"><del><strong>which users 
can check</strong></del></span> <span class="inserted"><ins><em>update was sent
+    out prematurely and on accident</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google was planning on disclosing
+    this new feature and offering it to customers who pay for 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy</em></ins></span> on <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    bosses can</em></ins></span> spy on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>user's &ldquo;consent&rdquo;</em></ins></span> is 
<span class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>not
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span class="inserted"><ins><em>almost anything, 
even probable exposure
+    most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>bosses that demand it should</em></ins></span> be 
<span class="removed"><del><strong>distracted by</strong></del></span> <span 
class="inserted"><ins><em>prosecuted for it.&lt;/p&gt;
+    be illegal</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>bosses that demand it should be prosecuted for 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201911190"&gt;
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to &lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>user's wifi password&lt;/a&gt;, and snoop on the 
household
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>wifi 
password would not be sufficient</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no 
excuse</strong></del></span> <span class="inserted"><ins><em>carry
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used by their
-    manufacturers</em></ins></span> for <span 
class="removed"><del><strong>malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
+    software lack this. Of course, they are also</em></ins></span> used <span 
class="removed"><del><strong>did</strong></del></span> <span 
class="inserted"><ins><em>by their
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
+  &lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when</em></ins></span> it <span class="removed"><del><strong>asked the 
user</strong></del></span> <span class="inserted"><ins><em>is not 
supposed</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>listen&lt;/a&gt;. 
Thus, when one of Google's
-    subcontractors discloses a thousand confidential voice recordings,
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is</em></ins></span> not <span class="removed"><del><strong>affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>thousand 
confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way</em></ins></span> to <span class="removed"><del><strong>the app 
developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows</strong></del></span> 
<span class="inserted"><ins><em>better control</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>recordings, Google
-    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why</strong></del></span> <span 
class="inserted"><ins><em>the person's voice.  It</em></ins></span> should 
<span class="removed"><del><strong>a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>only
-    get commands that the user wants to</em></ins></span> send <span 
class="removed"><del><strong>any information</strong></del></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there</em></ins></span> is <span class="inserted"><ins><em>no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should</em></ins></span> not <span class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>record or listen</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>the person's 
voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+  &lt;li id="M201905061"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information 
from</em></ins></span> users <span class="removed"><del><strong>identify 
themselves</strong></del></span>
-    <span class="inserted"><ins><em>than is necessary for correct functioning 
(time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>then</strong></del></span> sends <span 
class="removed"><del><strong>personal</strong></del></span>
-    <span class="inserted"><ins><em>it to Amazon's servers, which store it 
indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their</em></ins></span> data <span 
class="removed"><del><strong>about them</strong></del></span> <span 
class="inserted"><ins><em>from Amazon's servers, &lt;a
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Amazon Alexa collects a lot more 
information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards</em></ins></span> it <span 
class="inserted"><ins><em>to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    the data remain on other servers&lt;/a&gt;, where they</em></ins></span> 
can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>be accessed by
     advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
+    deleting</em></ins></span> the <span class="removed"><del><strong>emails 
of members</strong></del></span> <span class="inserted"><ins><em>collected 
information doesn't cancel the wrong</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span>
+    <span class="inserted"><ins><em>collecting it.&lt;/p&gt;
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;</em></ins></span>
+    the devices are tethered to. Moreover,</em></ins></span> they <span 
class="removed"><del><strong>pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the present, but</em></ins></span> in <span 
class="removed"><del><strong>Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the past (and, who knows,</em></ins></span>
+    in <span class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the future too?)&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded</em></ins></span> for <span 
class="removed"><del><strong>companies,</strong></del></span> <span 
class="inserted"><ins><em>Amazon employees to listen to&lt;/a&gt;. The 
Google</em></ins></span> and <span class="inserted"><ins><em>Apple
-    voice assistants do similar things.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Some of users' 
commands</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span> 
to <span class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> the 
<span class="removed"><del><strong>manufacturer is using 
it</strong></del></span> <span class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>listen 
to&lt;/a&gt;. The Google</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>Apple
+    voice assistants do similar things.&lt;/p&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other</em></ins></span> personal <span 
class="removed"><del><strong>information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A fraction of</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span> <span class="inserted"><ins><em>Alexa 
service staff</em></ins></span> even <span class="removed"><del><strong>which 
page</strong></del></span> <span class="inserted"><ins><em>has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data 
<span class="removed"><del><strong>may be
-        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>processing is done
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>client 
program is nonfree, and data processing is done
     &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in</em></ins></span>
-    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing way of saying 
&ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no way
-    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>a
-        data broker, the data broker can figure out who</strong></del></span> 
the <span class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    the <span class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span> <span 
class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing 
way</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>saying &ldquo;We won't
+    tell you how and where</em></ins></span> it's
+      <span class="removed"><del><strong>needed</strong></del></span> <span 
class="inserted"><ins><em>done&rdquo;), users have no way</em></ins></span>
+    to <span class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>know what happens to 
the recordings unless human eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through</strong></del></span>
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>user is still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it 
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+    paying</em></ins></span> for
+    <span class="removed"><del><strong>authentication, you 
couldn't</strong></del></span> <span class="inserted"><ins><em>the 
subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span class="removed"><del><strong>is 
surrounded by a person's
-      body),</strong></del></span> <span class="inserted"><ins><em>spies on 
users,</em></ins></span> and <span class="inserted"><ins><em>involves totally 
unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>use 
of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    &lt;p&gt;Even though the ink subscription program may</em></ins></span> be 
<span class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be</em></ins></span> in
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>security of an 
Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="removed"><del><strong>make statements about
-      their products, rather than free software which users can check
-      and change.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
+    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>car remotely, the 
cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span class="removed"><del><strong>track 
the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> in <span 
class="removed"><del><strong>cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>that country,
+    do you think Amazon would have the moral fiber</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter of proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers</em></ins></span> are <span 
class="removed"><del><strong>an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too,</em></ins></span> but <span 
class="removed"><del><strong>the invasion isn't done</strong></del></span> 
<span class="inserted"><ins><em>please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
@@ -3050,99 +3208,42 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
+      cases mentioned</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+  &lt;li id="M201706204"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Lots of &ldquo;smart&rdquo; 
products are designed &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>everyone</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used 
did</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does</em></ins></span> not <span 
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>include 
any way of making</em></ins></span>
-    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows install 
is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>device that can obey your voice commands without 
potentially spying</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>can collect the emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>car's location 
at</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>way of making
+    a device that can obey your voice commands without potentially spying
+    on you.  Even</em></ins></span> if <span class="removed"><del><strong>the 
state orders</strong></del></span> it <span class="removed"><del><strong>to get 
the data
+      and hand</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+  &lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about</em></ins></span> the <span class="removed"><del><strong>state 
can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
-
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
+&lt;!-- #SpywareAtHome</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
@@ -3150,38 +3251,31 @@
 <span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
     <span class="inserted"><ins><em>&lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>sheeple to find</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>normal that companies
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3197,7 +3291,7 @@
     are malware, violating people (specially children's)
     privacy. In addition, they have a lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
@@ -3213,8 +3307,8 @@
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>a back door, but that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
@@ -3222,20 +3316,18 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
+    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
     too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
@@ -3243,25 +3335,53 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    upload data</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can <span class="removed"><del><strong>contain Javascript 
code,</strong></del></span>
-    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If you want
-    GPS navigation, get a separate navigator which runs free 
software</em></ins></span>
-    and <span class="inserted"><ins><em>works with Open Street Map.&lt;/p&gt;
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I 
see</strong></del></span> <span class="inserted"><ins><em>its GPS antenna.  
If</em></ins></span> you <span class="removed"><del><strong>on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>want
+    GPS navigation, get a separate navigator which runs free software
+    and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;
+    record and send various kinds</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal</strong></del></span> data <span 
class="removed"><del><strong>are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For
+    the user, access</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>nearly impossible, 
as</em></ins></span> it <span class="removed"><del><strong>enabled by 
default</strong></del></span> <span class="inserted"><ins><em>involves
+    cracking the car's computer, which</em></ins></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running</em></ins></span> with 
<span class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
@@ -3269,197 +3389,171 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+  &lt;li id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you 
succeeded</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> <span 
class="inserted"><ins><em>breaking</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
+    antenna</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;</em></ins></span>
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;GM &lt;a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>e-reader 
used</strong></del></span> <span class="inserted"><ins><em>choices of radio 
programs&lt;/a&gt; in its
-    &ldquo;connected&rdquo; cars, minute</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send</strong></del></span> <span 
class="inserted"><ins><em>minute.&lt;/p&gt;
-
-    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into the contract that users sign for some digital service
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span class="inserted"><ins><em>into the 
contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect</em></ins></span> lots of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>other data: listening</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that 
data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But if you really want</em></ins></span> to <span 
class="inserted"><ins><em>be safe, we must make sure</em></ins></span> the 
<span class="removed"><del><strong>US</strong></del></span> <span 
class="inserted"><ins><em>car's
+    hardware cannot collect any of that data,</em></ins></span> or <span 
class="removed"><del><strong>some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not to be trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>that the 
software</em></ins></span>
+    is <span class="removed"><del><strong>done
+    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="car-spying"&gt;Computerized</em></ins></span> cars with nonfree 
software are &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;</em></ins></span>
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
+  &lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The</em></ins></span> Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone <span 
class="inserted"><ins><em>to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;</em></ins></span>
-    access its computers remotely and make changes in various
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to &lt;a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and
+      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell <span 
class="removed"><del><strong>phone
-    modem enables the phone company to track the car's movements all
-    the time; it is possible to physically remove the cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system</em></ins></span> has no <span 
class="removed"><del><strong>effect.  (The fact that the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it
+      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>invasion 
isn't done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>phone company to track the car's movements all 
the time;
-    it is possible to physically remove</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+      could spy this way.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201306140"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla</em></ins></span> cars allow the company to extract
-    data remotely and determine the car's location
-    at any time. (See
-      <span class="removed"><del><strong>&lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;</strong></del></span>
 Section 2, paragraphs b and <span 
class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
-    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.)</em></ins></span> The company says it 
doesn't store this
-    information, but if the state orders it to get the data and hand it
-    over, the state <span class="removed"><del><strong>can store it.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
+&lt;!-- #SpywareAtPlay --&gt;
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>the car remotely, 
the cell phone modem
+    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
-      not work.&rdquo;&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
-      across devices.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
  
-      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>can 
store it.&lt;/p&gt;
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
@@ -3467,21 +3561,19 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, 
which</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>made
-    available</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance companies, and 
others.&lt;/p&gt;
-
-    &lt;p&gt;The case of toll-collection systems, mentioned 
in</em></ins></span> this <span class="removed"><del><strong>off, but having it 
enabled by default</strong></del></span> <span 
class="inserted"><ins><em>article,</em></ins></span>
-    is <span class="inserted"><ins><em>not really a matter of proprietary 
surveillance. These systems
-    are</em></ins></span> an <span class="removed"><del><strong>injustice 
already.&lt;/p&gt;
-  &lt;/li&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      companies.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>intolerable invasion of privacy, and should be 
replaced</em></ins></span> with <span class="removed"><del><strong>Viacom adds 
2.3 million households to
-      the 600 millions social media profiles</strong></del></span>
-    <span class="inserted"><ins><em>anonymous payment systems, 
but</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being 
watched</strong></del></span> <span 
class="inserted"><ins><em>done</em></ins></span> by
-      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door</strong></del></span> <span class="inserted"><ins><em>matter of 
proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
+    anonymous payment systems, but the invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3495,238 +3587,177 @@
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require</em></ins></span>
-    users to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>identify 
themselves</em></ins></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
-    free rein</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus 
users.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>identify themselves to Facebook&lt;/a&gt;. This will 
give Facebook
+    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612230"&gt;
+  &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential for the most intimate
-    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>isn't a TV channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>takes to make this potential 
real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    creates</em></ins></span> the <span class="removed"><del><strong>game play 
for specific players.&lt;/p&gt;
+
+      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>potential for</em></ins></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>most intimate
+    surveillance ever. All it takes to make this potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>maximum possible
+    &lt;p&gt;You</em></ins></span> can <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the 
<span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
     surveillance on Oculus Rift devices. The moral is, never trust a VR
     system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware</em></ins></span> on the <span 
class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
-      give</strong></del></span> <span class="inserted"><ins><em>Web&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
-   programs, so</em></ins></span> it
-   <span class="inserted"><ins><em>&lt;a 
href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense</em></ins></span> to <span class="removed"><del><strong>the 
US</strong></del></span> <span class="inserted"><ins><em>call them 
&ldquo;free&rdquo;</em></ins></span> or <span class="removed"><del><strong>some 
other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance</em></ins></span> is <span 
class="removed"><del><strong>not to be trusted unless</strong></del></span> 
<span class="inserted"><ins><em>an abuse all the same.&lt;/p&gt;
+   programs, so it
+   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance is an abuse all the same.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Online</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of April 2019,</em></ins></span> it is <span 
class="removed"><del><strong>done
-    by free software in your own computer.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
+    &lt;p&gt;As of April 2019, it is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
     longer possible to disable an
     unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
     
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge</em></ins></span> and <span 
class="inserted"><ins><em>also in</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>upcoming Microsoft Edge that is
-    going</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>be based on Chromium.&lt;/p&gt;
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    going to be based on Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901101"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Until 2015, any tweet</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports</strong></del></span> <span 
class="inserted"><ins><em>listed</em></ins></span> a <span 
class="removed"><del><strong>404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>geographical tag 
&lt;a
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent</em></ins></span> the <span class="removed"><del><strong>server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>precise GPS location to Twitter's server&lt;/a&gt;. 
It still
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
     contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Storyful program</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies</em></ins></span>
-    on the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed</strong></del></span> <span 
class="inserted"><ins><em>reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;When</em></ins></span> a <span class="removed"><del><strong>patch 
to stop this, but any product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>page uses Disqus
-    for comments, the proprietary Disqus software</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
-    a Facebook software package into the browser</em></ins></span> of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>every anonymous visitor
-    to the page,</em></ins></span> and <span class="removed"><del><strong>even 
what they wanted</strong></del></span> <span class="inserted"><ins><em>makes 
the page's URL available</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;When a page uses Disqus
+    for comments, the proprietary Disqus software &lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtPlay</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612064"&gt;
+  &lt;li id="M201612064"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Online sales, with 
tracking</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>surveillance of customers, &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses</em></ins></span> to <span class="inserted"><ins><em>show 
different people different prices&lt;/a&gt;. Most of</em></ins></span>
-    the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>tracking</em></ins></span> is <span 
class="removed"><del><strong>a computer, and you can't trust a 
computer</strong></del></span> <span class="inserted"><ins><em>done by 
recording interactions</em></ins></span> with 
-      <span class="removed"><del><strong>a nonfree operating 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>servers, but
-    proprietary software contributes.&lt;/p&gt;</em></ins></span>
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the <span class="removed"><del><strong>tracking is done by recording 
interactions with
+      servers, but proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data about their users and 
their</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tracking is done by recording interactions with 
servers, but
+    proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
+  &lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA to directly examine</em></ins></span> 
users' 
-      <span class="removed"><del><strong>friends and 
associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad</strong></del></span>
-    <span class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
+    Microsoft SkyDrive allows the NSA to directly examine users'
+    data&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites rat their visitors to advertising</em></ins></span>
-    networks that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>track users.  Of</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected by various cr&hellip;apps and</strong></del></span> <span 
class="inserted"><ins><em>top 1000 web sites, &lt;a
+    &lt;p&gt;Many web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
     
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
     (as of 5/17/2012) fed their visitors third-party cookies, allowing
-    other</em></ins></span> sites <span class="removed"><del><strong>made by 
different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this data</strong></del></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>track them&lt;/a&gt;.&lt;/p&gt;
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201208210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites report all their visitors</em></ins></span>
-    to <span class="removed"><del><strong>buy things,</strong></del></span> 
<span class="inserted"><ins><em>Google by using the Google Analytics service, 
which &lt;a
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and <span 
class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>the page that was visited&lt;/a&gt;.&lt;/p&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites try</em></ins></span> to <span 
class="removed"><del><strong>spend a lot</strong></del></span> <span 
class="inserted"><ins><em>collect users' address books (the user's 
list</em></ins></span>
-    of <span class="removed"><del><strong>money. They 
-      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
-
-      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>other people's phone numbers or email addresses).  
This violates</em></ins></span>
-    the <span class="removed"><del><strong>article describes gratis games, 
games</strong></del></span> <span class="inserted"><ins><em>privacy of those 
other people.&lt;/p&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201110040"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Pages</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
-    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even 
users</em></ins></span>
-    that <span class="removed"><del><strong>cost money 
-      can use the same tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>don't have Facebook 
accounts.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Pages</em></ins></span> that contain &ldquo;Like&rdquo; buttons 
&lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</em></ins></span>
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
+    &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>rat</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop</em></ins></span> on <span class="inserted"><ins><em>information 
that users have typed into a
-    form but not sent&lt;/a&gt;, in order to learn</em></ins></span> their 
<span class="removed"><del><strong>visitors.  Web sites</strong></del></span> 
<span class="inserted"><ins><em>identity. Some</em></ins></span> are <span 
class="removed"><del><strong>not
-   programs, so it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn</em></ins></span> their 
<span class="removed"><del><strong>visitors</strong></del></span> <span 
class="inserted"><ins><em>identity. Some are &lt;a
+    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
     &lt;p&gt;The chat facilities of some customer services use the same sort of
-    malware</em></ins></span> to <span class="removed"><del><strong>call them 
&ldquo;free&rdquo; or &ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    malware</em></ins></span> to <span 
class="removed"><del><strong>advertising networks</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what</em></ins></span> the <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>an abuse</strong></del></span> <span 
class="inserted"><ins><em>typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807190"&gt;
@@ -3750,24 +3781,14 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect</em></ins></span> all the <span 
class="removed"><del><strong>same.&lt;/p&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking and surveillance of 
customers,</strong></del></span> <span class="inserted"><ins><em>user's 
input,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-      businesses</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used</em></ins></span> to <span 
class="removed"><del><strong>show different people different prices&lt;/a&gt;. 
Most
-      of</strong></del></span> <span 
class="inserted"><ins><em>reproduce</em></ins></span> the <span 
class="removed"><del><strong>tracking is done by recording interactions with
-      servers, but proprietary software 
contributes.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>whole session&lt;/a&gt;.&lt;/p&gt;
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If you use LibreJS, it will block</em></ins></span> that <span 
class="inserted"><ins><em>malicious JavaScript
+    code.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3779,13 +3800,9 @@
   &lt;li id="M201310110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; 
buttons</strong></del></span> <span class="inserted"><ins><em>JavaScript are 
used for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
@@ -3793,7 +3810,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Flash Player's &lt;a
     
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites</em></ins></span> track <span 
class="removed"><del><strong>visitors</strong></del></span> <span 
class="inserted"><ins><em>visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps web sites</em></ins></span> track
+      <span class="removed"><del><strong>users.  Of</strong></del></span> 
<span class="inserted"><ins><em>visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3810,61 +3828,57 @@
     &lt;p&gt;Google Chrome is an &lt;a
     
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
     instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report the sites they visit</em></ins></span> to 
<span class="removed"><del><strong>those 
pages&lt;/a&gt;&mdash;even</strong></del></span> <span 
class="inserted"><ins><em>advertising and
-    data companies, first of all to Google. Moreover, if</em></ins></span> 
users <span class="removed"><del><strong>that don't</strong></del></span> have 
<span class="removed"><del><strong>Facebook accounts.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many web sites rat</strong></del></span> <span 
class="inserted"><ins><em>a
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
     Gmail account, Chrome automatically logs them in to the browser for
-    more convenient profiling. On Android, Chrome also 
reports</em></ins></span> their <span 
class="removed"><del><strong>visitors</strong></del></span>
-    <span class="inserted"><ins><em>location to Google.&lt;/p&gt;
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way to escape surveillance is to 
switch</em></ins></span> to <span class="removed"><del><strong>advertising 
networks that track
-      users.  Of the top 1000 web sites,</strong></del></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a 
modified version</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other
-      sites</strong></del></span> <span class="inserted"><ins><em>Firefox
-    with several changes</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
+    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
+    with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites report 
all their visitors to Google by using
-      the Google Analytics service, which</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+  &lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>lack
-    of transparency on the part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools,</em></ins></span> the <span class="removed"><del><strong>top 1000 
web sites, &lt;a
+      
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span> <span 
class="inserted"><ins><em>difficulty</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing</strong></del></span> <span class="inserted"><ins><em>opting out of 
these services, and the lack
+    of proper privacy policies, among</em></ins></span> other
+      <span class="removed"><del><strong>sites to track 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
-      user's list</strong></del></span>
-    <span class="inserted"><ins><em>schools, the difficulty</em></ins></span> 
of <span class="removed"><del><strong>other people's phone numbers or email 
addresses).
-      This violates</strong></del></span> <span 
class="inserted"><ins><em>opting out of these services, and</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
-    of <span class="removed"><del><strong>those</strong></del></span> <span 
class="inserted"><ins><em>proper privacy policies, among</em></ins></span> 
other <span class="removed"><del><strong>people.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many web sites report all their visitors to Google by 
using</strong></del></span> <span class="inserted"><ins><em>things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that</em></ins></span> the <span 
class="inserted"><ins><em>software</em></ins></span> Google <span 
class="removed"><del><strong>Analytics service, which</strong></del></span> 
<span class="inserted"><ins><em>uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If</em></ins></span> the <span 
class="removed"><del><strong>IP address</strong></del></span> <span 
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and 
<span class="inserted"><ins><em>teachers
+    can mandate their representatives at</em></ins></span> the <span 
class="removed"><del><strong>page that was visited.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many web sites try</strong></del></span> <span 
class="inserted"><ins><em>School Board</em></ins></span> to <span 
class="removed"><del><strong>collect users' address books (the
+      user's list of other people's phone numbers or email addresses).
+      This violates</strong></del></span> <span 
class="inserted"><ins><em>refuse</em></ins></span> the <span 
class="removed"><del><strong>privacy of those other people.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize that</em></ins></span> the <span 
class="removed"><del><strong>NSA to directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span>
+    <span class="inserted"><ins><em>budget unless</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>school initiates a switch</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' data&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software Google uses</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>students is
-    nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt; for both education and school
-    administration. If the school is run locally, parents and teachers
-    can mandate their representatives at the School Board to refuse the
-    budget unless the school initiates a switch to free software. If
-    education is run nation-wide, they need to persuade legislators
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>free software. If
+    education is run nation-wide, they need</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>persuade 
legislators
     (e.g., through free software organizations, political parties,
     etc.) to migrate the public schools to free software.&lt;/p&gt;
   &lt;/li&gt;
@@ -3940,20 +3954,38 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
-      &ldquo;their&rdquo; phones</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The natural extension</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice</em></ins></span> of <span 
class="removed"><del><strong>monitoring people through 
+      &ldquo;their&rdquo; phones is &lt;a 
+      
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary</strong></del></span> <span class="inserted"><ins><em>being 
forced to run nonfree</em></ins></span> software <span 
class="inserted"><ins><em>in order</em></ins></span> to <span 
class="removed"><del><strong>make sure they can't 
&ldquo;fool&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202009070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;While the world</em></ins></span> is <span 
class="inserted"><ins><em>still
-    struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    &lt;p&gt;While</em></ins></span> the 
+      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
     are in danger of surveillance&lt;/a&gt; and their computers are infected
-    with malware as a result of installing</em></ins></span> proprietary <span 
class="removed"><del><strong>software to make sure they can't 
&ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software.&lt;/p&gt;</em></ins></span>
+    with malware as a result of installing proprietary 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
@@ -4087,7 +4119,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 16:03:04 $
+$Date: 2021/02/22 10:31:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.372
retrieving revision 1.373
diff -u -b -r1.372 -r1.373
--- proprietary-surveillance.ja.po      6 Feb 2021 14:33:06 -0000       1.372
+++ proprietary-surveillance.ja.po      22 Feb 2021 10:31:57 -0000      1.373
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4322,6 +4322,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary-surveillance.pot        6 Feb 2021 14:33:06 -0000       1.311
+++ proprietary-surveillance.pot        22 Feb 2021 10:31:57 -0000      1.312
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3496,6 +3496,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\";>tracks
 "
+"students and collects data</a> such as face, driving license, and network "
+"information, among others, in blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a "
 
"href=\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people
 "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.689
retrieving revision 1.690
diff -u -b -r1.689 -r1.690
--- proprietary-surveillance.ru.po      9 Feb 2021 05:32:09 -0000       1.689
+++ proprietary-surveillance.ru.po      22 Feb 2021 10:31:57 -0000      1.690
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5172,6 +5173,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "While the world is still struggling with COVID-19 coronavirus, many <a href="
 "\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\";>people "
 "are in danger of surveillance</a> and their computers are infected with "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary.de-diff.html    6 Feb 2021 14:33:06 -0000       1.227
+++ proprietary.de-diff.html    22 Feb 2021 10:31:58 -0000      1.228
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,10 +58,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -224,6 +224,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -273,20 +290,6 @@
     wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -350,7 +353,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.de.po   6 Feb 2021 14:33:06 -0000       1.263
+++ proprietary.de.po   22 Feb 2021 10:31:58 -0000      1.264
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -539,22 +557,6 @@
 "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
 "to-avoid#Monetize\">„monetarisieren“</a> verwendet."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.399
retrieving revision 1.400
diff -u -b -r1.399 -r1.400
--- proprietary.es.po   7 Feb 2021 10:33:37 -0000       1.399
+++ proprietary.es.po   22 Feb 2021 10:31:58 -0000      1.400
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -341,6 +342,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -419,30 +438,6 @@
 "«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
 "html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">obligando a "
-"sus usuarios a ceder datos personales sensibles</a> a su empresa matriz. "
-"Esto aumenta el poder de Facebook sobre sus usuarios, comprometiendo aún 
más "
-"la privacidad y seguridad la gente."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"En vez de WhatsApp puede utilizar <a href=\"https://directory.fsf.org/wiki/";
-"Jami\">GNU Jami</a>, que es software libre y no recopila sus datos."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -522,3 +517,26 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/"
+#~ "\">obligando a sus usuarios a ceder datos personales sensibles</a> a su "
+#~ "empresa matriz. Esto aumenta el poder de Facebook sobre sus usuarios, "
+#~ "comprometiendo aún más la privacidad y seguridad la gente."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/";
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "En vez de WhatsApp puede utilizar <a href=\"https://directory.fsf.org/";
+#~ "wiki/Jami\">GNU Jami</a>, que es software libre y no recopila sus datos."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.445
retrieving revision 1.446
diff -u -b -r1.445 -r1.446
--- proprietary.fr.po   6 Feb 2021 16:22:45 -0000       1.445
+++ proprietary.fr.po   22 Feb 2021 10:31:58 -0000      1.446
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2021-02-06 17:22+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -338,6 +339,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -414,31 +433,6 @@
 "<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
 "to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"À compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">force ses "
-"utilisateurs à communiquer des données personnelles sensibles</a> à la "
-"maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs et "
-"compromet un peu plus leur vie privée et leur sécurité."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"À la place de WhatsApp, vous pouvez utiliser <a 
href=\"https://directory.fsf.";
-"org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
-"libertés numériques de l'utilisateur."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -511,3 +505,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "À compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">force "
+#~ "ses utilisateurs à communiquer des données personnelles sensibles</a> à 
"
+#~ "la maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs 
"
+#~ "et compromet un peu plus leur vie privée et leur sécurité."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/";
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "À la place de WhatsApp, vous pouvez utiliser <a href=\"https://directory.";
+#~ "fsf.org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte "
+#~ "les libertés numériques de l'utilisateur."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.it-diff.html    6 Feb 2021 14:33:06 -0000       1.239
+++ proprietary.it-diff.html    22 Feb 2021 10:31:58 -0000      1.240
@@ -58,10 +58,9 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -71,8 +70,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -139,18 +139,18 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -223,6 +223,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,20 +289,6 @@
     wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -349,7 +352,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.272
retrieving revision 1.273
diff -u -b -r1.272 -r1.273
--- proprietary.it.po   6 Feb 2021 14:33:06 -0000       1.272
+++ proprietary.it.po   22 Feb 2021 10:31:58 -0000      1.273
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -533,22 +551,6 @@
 "\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary.ja-diff.html    6 Feb 2021 14:33:06 -0000       1.244
+++ proprietary.ja-diff.html    22 Feb 2021 10:31:58 -0000      1.245
@@ -56,14 +56,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -173,14 +173,14 @@
   &lt;td&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
@@ -205,10 +205,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -228,6 +228,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -277,20 +294,6 @@
     wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -354,7 +357,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary.ja.po   6 Feb 2021 14:33:06 -0000       1.256
+++ proprietary.ja.po   22 Feb 2021 10:31:58 -0000      1.257
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -391,22 +409,6 @@
 "\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary.nl-diff.html    6 Feb 2021 14:33:06 -0000       1.240
+++ proprietary.nl-diff.html    22 Feb 2021 10:31:58 -0000      1.241
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,10 +58,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -199,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -223,6 +223,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,20 +289,6 @@
     wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -349,7 +352,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary.nl.po   6 Feb 2021 14:33:06 -0000       1.246
+++ proprietary.nl.po   22 Feb 2021 10:31:58 -0000      1.247
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -436,22 +454,6 @@
 "\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary.pl-diff.html    6 Feb 2021 14:33:06 -0000       1.257
+++ proprietary.pl-diff.html    22 Feb 2021 10:31:58 -0000      1.258
@@ -167,11 +167,11 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -222,6 +222,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,20 +288,6 @@
     wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -348,7 +351,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.pl.po   6 Feb 2021 14:33:06 -0000       1.239
+++ proprietary.pl.po   22 Feb 2021 10:31:58 -0000      1.240
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -617,22 +635,6 @@
 "\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.pot     6 Feb 2021 14:33:07 -0000       1.236
+++ proprietary.pot     22 Feb 2021 10:31:58 -0000      1.237
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\";>tracks
 "
+"students and collects data</a> such as face, driving license, and network "
+"information, among others, in blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a "
 "href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth\";> "
@@ -328,22 +345,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a "
-"href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\";>forcing
 "
-"its users to hand over sensitive personal data</a> to its parent "
-"company. This increases Facebook's power over users, and further jeopardizes "
-"people's privacy and security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a "
-"href=\"https://directory.fsf.org/wiki/Jami\";>GNU Jami</a>, which is free "
-"software and will not collect your data."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- proprietary.pt-br.po        7 Feb 2021 19:01:05 -0000       1.388
+++ proprietary.pt-br.po        22 Feb 2021 10:31:58 -0000      1.389
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2021-02-07 15:33-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 3.38.0\n"
 
@@ -335,6 +336,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -412,30 +431,6 @@
 "como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
 "small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando "
-"seus usuários a entregar dados pessoais confidenciais</a> para sua empresa-"
-"mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica ainda "
-"mais a privacidade e a segurança das pessoas."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"Em vez do WhatsApp, você pode usar o <a href=\"https://directory.fsf.org/";
-"wiki/Jami\">GNU Jami</a>, que é um software livre e não coleta seus dados."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -511,6 +506,29 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando 
"
+#~ "seus usuários a entregar dados pessoais confidenciais</a> para sua "
+#~ "empresa-mãe. Isso aumenta o poder do Facebook sobre os usuários e "
+#~ "prejudica ainda mais a privacidade e a segurança das pessoas."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/";
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "Em vez do WhatsApp, você pode usar o <a href=\"https://directory.fsf.org/";
+#~ "wiki/Jami\">GNU Jami</a>, que é um software livre e não coleta seus 
dados."
+
+#~ msgid ""
 #~ "The personal finance management software &ldquo;Quicken&rdquo; <a href="
 #~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\";> has a "
 #~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- proprietary.ru.po   9 Feb 2021 05:32:09 -0000       1.470
+++ proprietary.ru.po   22 Feb 2021 10:31:58 -0000      1.471
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -415,31 +434,6 @@
 "html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
 "взломщиков.)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"На 2021 год WhatsApp (один из филиалов Facebook) <a 
href=\"https://www.";
-"forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-"
-"with-facebook-or-well-deactivate-your-account/\">принуждает 
своих "
-"пользователей выдавать конфиденциальные 
персональные данные</a> родительской "
-"компании. Это усиливает власть Facebook над 
пользователями и еще более "
-"подрывает неприкосновенность личной 
жизни и безопасность людей."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"Вместо WhatsApp вы можете пользоваться <a 
href=\"https://directory.fsf.org/";
-"wiki/Jami\">GNU Jami</a>, это свободная программа, 
она не будет собивать "
-"ваши данные."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -516,6 +510,30 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "На 2021 год WhatsApp (один из филиалов Facebook) <a 
href=\"https://www.";
+#~ "forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+#~ "data-with-facebook-or-well-deactivate-your-account/\">принуждает 
своих "
+#~ "пользователей выдавать 
конфиденциальные персональные данные</a> "
+#~ "родительской компании. Это усиливает 
власть Facebook над пользователями и "
+#~ "еще более подрывает неприкосновенность 
личной жизни и безопасность людей."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/";
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "Вместо WhatsApp вы можете пользоваться <a 
href=\"https://directory.fsf.";
+#~ "org/wiki/Jami\">GNU Jami</a>, это свободная 
программа, она не будет "
+#~ "собивать ваши данные."
+
+#~ msgid ""
 #~ "Many popular mobile games include a random-reward system called <a href="
 #~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
 #~ "One variant of gacha was declared illegal in Japan in 2012, but the other "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.tr.po   7 Feb 2021 08:07:08 -0000       1.122
+++ proprietary.tr.po   22 Feb 2021 10:31:58 -0000      1.123
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2021-02-07 09:05+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.1\n"
 
@@ -336,6 +337,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -413,30 +432,6 @@
 "philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
 "adlandırdığını belirtmek isteriz)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"2021 itibariyle WhatsApp (Facebook'un iştiraklerinden biri), 
kullanıcılarını "
-"ana kuruluşa <a href=\"https://www.forbes.com/sites/carlypage/2021/01/08/";
-"whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-"
-"account/\">hassas kişisel verilerini teslim etmeye zorluyor</a>. Bu "
-"Facebook'un kullanıcılar üzerindeki iktidarını arttırdığı gibi "
-"kullanıcıların gizlilik ve güvenliğini tehlikeye sokar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"WhatsApp yerine <a href=\"https://directory.fsf.org/wiki/Jami\";>GNU Jami</a> "
-"kullanabilirsiniz, özgür bir yazılımdır ve verinizi toplamaz."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -518,6 +513,29 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "2021 itibariyle WhatsApp (Facebook'un iştiraklerinden biri), "
+#~ "kullanıcılarını ana kuruluşa <a href=\"https://www.forbes.com/sites/";
+#~ "carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-"
+#~ "or-well-deactivate-your-account/\">hassas kişisel verilerini teslim "
+#~ "etmeye zorluyor</a>. Bu Facebook'un kullanıcılar üzerindeki 
iktidarını "
+#~ "arttırdığı gibi kullanıcıların gizlilik ve güvenliğini tehlikeye 
sokar."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/";
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "WhatsApp yerine <a href=\"https://directory.fsf.org/wiki/Jami\";>GNU Jami</"
+#~ "a> kullanabilirsiniz, özgür bir yazılımdır ve verinizi toplamaz."
+
+#~ msgid ""
 #~ "Many popular mobile games include a random-reward system called <a href="
 #~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
 #~ "One variant of gacha was declared illegal in Japan in 2012, but the other "

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary.zh-cn.po        9 Feb 2021 07:31:38 -0000       1.154
+++ proprietary.zh-cn.po        22 Feb 2021 10:31:58 -0000      1.155
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2021-02-09 15:10+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -315,6 +316,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -383,29 +402,6 @@
 "<small>(请注意,本文错误地将 <a 
href=\"/philosophy/words-to-avoid."
 "html#Hacker\">黑客</a> 一词当成骇客来用。)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"在 2021,WhatsApp(Facebook 的一个下属机构)<a 
href=\"https://www.forbes.com/";
-"sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
-"facebook-or-well-deactivate-your-account/\">强制å…
¶ç”¨æˆ·æäº¤ä»–们的敏感个人数据"
-"</a> 给其母公司。这就增强了 Facebook 
对用户的控制力,并进一步侵害了人们的隐私"
-"和安全。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"不用 WhatsApp,你可以用 <a 
href=\"https://directory.fsf.org/wiki/Jami\";>GNU "
-"Jami</a>,这是一个自由软件,它不会搜集你的数据。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -491,6 +487,28 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "在 2021,WhatsApp(Facebook 的一个下属机构)<a 
href=\"https://www.forbes.";
+#~ "com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
+#~ "facebook-or-well-deactivate-your-account/\">强制å…
¶ç”¨æˆ·æäº¤ä»–们的敏感个人数"
+#~ "据</a> 给其母公司。这就增强了 Facebook 
对用户的控制力,并进一步侵害了人们"
+#~ "的隐私和安全。"
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/";
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "不用 WhatsApp,你可以用 <a 
href=\"https://directory.fsf.org/wiki/Jami";
+#~ "\">GNU Jami</a>,这是一个自由软件,它不会搜集你
的数据。"
+
+#~ msgid ""
 #~ "Many popular mobile games include a random-reward system called <a href="
 #~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
 #~ "One variant of gacha was declared illegal in Japan in 2012, but the other "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary.zh-tw-diff.html 6 Feb 2021 14:33:07 -0000       1.220
+++ proprietary.zh-tw-diff.html 22 Feb 2021 10:31:58 -0000      1.221
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,10 +58,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
@@ -224,6 +224,23 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -273,20 +290,6 @@
     wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202101080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -350,7 +353,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/02/06 14:33:07 $
+$Date: 2021/02/22 10:31:58 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary.zh-tw.po        6 Feb 2021 14:33:07 -0000       1.226
+++ proprietary.zh-tw.po        22 Feb 2021 10:31:58 -0000      1.227
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Many cr&hellip;apps, developed by various companies for various "
 "organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/";
 "investigation-xoth\"> location tracking unknown to those companies and those "
@@ -506,22 +524,6 @@
 "\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- pt-br.po    7 Feb 2021 19:01:05 -0000       1.356
+++ pt-br.po    22 Feb 2021 10:31:58 -0000      1.357
@@ -9397,33 +9397,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
-"Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando "
-"seus usuários a entregar dados pessoais confidenciais</a> para sua empresa-"
-"mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica ainda "
-"mais a privacidade e a segurança das pessoas."
 
 #. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest";
-#| "\">Minetest</a> instead. Minetest is free software and respects the "
-#| "user's computer freedom."
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
-"As pessoas podem jogar <a href=\"https://directory.fsf.org/wiki/Minetest";
-"\">Minetest</a> em vez disso. Minetest é um software livre e respeita a "
-"liberdade de computação do usuário."
 
 #
 #.  TRANSLATORS: Ignore the original text in this paragraph,
@@ -9966,6 +9954,36 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
+"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-";
+"share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando "
+"seus usuários a entregar dados pessoais confidenciais</a> para sua empresa-"
+"mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica ainda "
+"mais a privacidade e a segurança das pessoas."
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest";
+#| "\">Minetest</a> instead. Minetest is free software and respects the "
+#| "user's computer freedom."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"As pessoas podem jogar <a href=\"https://directory.fsf.org/wiki/Minetest";
+"\">Minetest</a> em vez disso. Minetest é um software livre e respeita a "
+"liberdade de computação do usuário."
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.603
retrieving revision 1.604
diff -u -b -r1.603 -r1.604
--- ru.po       9 Feb 2021 06:01:29 -0000       1.603
+++ ru.po       22 Feb 2021 10:31:58 -0000      1.604
@@ -11250,28 +11250,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
-"На 2021 год WhatsApp (один из филиалов Facebook) <a 
href=\"https://www.";
-"forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-"
-"with-facebook-or-well-deactivate-your-account/\">принуждает 
своих "
-"пользователей выдавать конфиденциальные 
персональные данные</a> родительской "
-"компании. Это усиливает власть Facebook над 
пользователями и еще более "
-"подрывает неприкосновенность личной 
жизни и безопасность людей."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
-"Вместо WhatsApp вы можете пользоваться <a 
href=\"https://directory.fsf.org/";
-"wiki/Jami\">GNU Jami</a>, это свободная программа, 
она не будет собивать "
-"ваши данные."
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -11895,6 +11888,31 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
 "\">#SpywareInTelephones</a>)</span>"
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"На 2021 год WhatsApp (один из филиалов Facebook) <a 
href=\"https://www.";
+"forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-"
+"with-facebook-or-well-deactivate-your-account/\">принуждает 
своих "
+"пользователей выдавать конфиденциальные 
персональные данные</a> родительской "
+"компании. Это усиливает власть Facebook над 
пользователями и еще более "
+"подрывает неприкосновенность личной 
жизни и безопасность людей."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"Вместо WhatsApp вы можете пользоваться <a 
href=\"https://directory.fsf.org/";
+"wiki/Jami\">GNU Jami</a>, это свободная программа, 
она не будет собивать "
+"ваши данные."
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr "Ай-штучки"

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- tr.po       7 Feb 2021 08:29:31 -0000       1.142
+++ tr.po       22 Feb 2021 10:31:59 -0000      1.143
@@ -8389,35 +8389,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
-"2021 itibariyle WhatsApp (Facebook'un iştiraklerinden biri), 
kullanıcılarını "
-"ana kuruluşa <a href=\"https://www.forbes.com/sites/carlypage/2021/01/08/";
-"whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-"
-"account/\">hassas kişisel verilerini teslim etmeye zorluyor</a>. Bu "
-"Facebook'un kullanıcılar üzerindeki iktidarını arttırdığı gibi "
-"kullanıcıların gizlilik ve güvenliğini tehlikeye sokar."
 
 #. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
-#| "play Minetest</a> instead. The essential advantage of Minetest is that it "
-#| "is free software, meaning it respects the user's computer freedom. As a "
-#| "bonus, it offers more options."
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
-"Minecraft oyuncuları bunun yerine <a href=\"https://directory.fsf.org/wiki/";
-"Minetest\">Minetest oynayabilirler</a>. Minetest'in temel yararı özgür "
-"yazılım olmasıdır, yani bilgisayar kullanıcılarının özgürlüğüne 
saygılıdır. "
-"Bonus olarak daha fazla seçenek sunuyor."
 
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -8957,6 +8943,38 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"2021 itibariyle WhatsApp (Facebook'un iştiraklerinden biri), 
kullanıcılarını "
+"ana kuruluşa <a href=\"https://www.forbes.com/sites/carlypage/2021/01/08/";
+"whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-"
+"account/\">hassas kişisel verilerini teslim etmeye zorluyor</a>. Bu "
+"Facebook'un kullanıcılar üzerindeki iktidarını arttırdığı gibi "
+"kullanıcıların gizlilik ve güvenliğini tehlikeye sokar."
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\";>can "
+#| "play Minetest</a> instead. The essential advantage of Minetest is that it "
+#| "is free software, meaning it respects the user's computer freedom. As a "
+#| "bonus, it offers more options."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"Minecraft oyuncuları bunun yerine <a href=\"https://directory.fsf.org/wiki/";
+"Minetest\">Minetest oynayabilirler</a>. Minetest'in temel yararı özgür "
+"yazılım olmasıdır, yani bilgisayar kullanıcılarının özgürlüğüne 
saygılıdır. "
+"Bonus olarak daha fazla seçenek sunuyor."
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- zh-cn.po    9 Feb 2021 07:31:38 -0000       1.145
+++ zh-cn.po    22 Feb 2021 10:31:59 -0000      1.146
@@ -8128,32 +8128,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
-"在 2021,WhatsApp(Facebook 的一个下属机构)<a 
href=\"https://www.forbes.com/";
-"sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
-"facebook-or-well-deactivate-your-account/\">强制å…
¶ç”¨æˆ·æäº¤ä»–们的敏感个人数据"
-"</a> 给其母公司。这就增强了 Facebook 
对用户的控制力,并进一步侵害了人们的隐私"
-"和安全。"
 
 #. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest";
-#| "\">Minetest</a> instead. Minetest is free software and respects the "
-#| "user's computer freedom."
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
-"玩家 <a href=\"https://directory.fsf.org/wiki/Minetest\";>可以去玩 
Minetest</"
-"a>,而不用非要玩 Minecraft。Minetest 
是自由软件,这意味着它尊重用户的计算自"
-"由。"
 
 #
 #
@@ -8687,6 +8676,35 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"在 2021,WhatsApp(Facebook 的一个下属机构)<a 
href=\"https://www.forbes.com/";
+"sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
+"facebook-or-well-deactivate-your-account/\">强制å…
¶ç”¨æˆ·æäº¤ä»–们的敏感个人数据"
+"</a> 给其母公司。这就增强了 Facebook 
对用户的控制力,并进一步侵害了人们的隐私"
+"和安全。"
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest";
+#| "\">Minetest</a> instead. Minetest is free software and respects the "
+#| "user's computer freedom."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"玩家 <a href=\"https://directory.fsf.org/wiki/Minetest\";>可以去玩 
Minetest</"
+"a>,而不用非要玩 Minecraft。Minetest 
是自由软件,这意味着它尊重用户的计算自"
+"由。"
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- zh-tw.po    6 Feb 2021 14:33:07 -0000       1.285
+++ zh-tw.po    22 Feb 2021 10:31:59 -0000      1.286
@@ -8110,18 +8110,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
 msgstr ""
 
 #
@@ -8686,6 +8688,22 @@
 "\">#SpywareInTelephones</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://";
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami";
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
 #. type: Content of: <div><div><div><h4>
 msgid "iThings"
 msgstr ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]