www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sun, 11 Apr 2021 09:04:39 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/04/11 09:04:38

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po nl.po pl.po pot 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary-manipulation.es.po 
                         proprietary-manipulation.fr.po 
                         proprietary-manipulation.pot 
                         proprietary-manipulation.ru.po 
                         proprietary-subscriptions.de-diff.html 
                         proprietary-subscriptions.de.po 
                         proprietary-subscriptions.es.po 
                         proprietary-subscriptions.fr.po 
                         proprietary-subscriptions.ja-diff.html 
                         proprietary-subscriptions.ja.po 
                         proprietary-subscriptions.pot 
                         proprietary-subscriptions.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.425&r2=1.426
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.525&r2=1.526
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.386&r2=1.387
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.620&r2=1.621
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.398&r2=1.399
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.701&r2=1.702
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.424&r2=1.425
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.467&r2=1.468
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.403&r2=1.404
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.489&r2=1.490
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.371&r2=1.372
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.626&r2=1.627
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.300&r2=1.301

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- de.po       11 Apr 2021 12:03:09 -0000      1.300
+++ de.po       11 Apr 2021 13:04:29 -0000      1.301
@@ -6324,6 +6324,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -11192,6 +11202,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.425
retrieving revision 1.426
diff -u -b -r1.425 -r1.426
--- es.po       11 Apr 2021 12:03:09 -0000      1.425
+++ es.po       11 Apr 2021 13:04:29 -0000      1.426
@@ -6311,6 +6311,16 @@
 "no es una opción activada por defecto."
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 # | Google Nest <a
 # | 
href=\"https://blog.google/products/google-nest/partnership-adt-smarter-home-security/\";>
 # | is taking over ADT</a>. Google sent out a software update to its speaker
@@ -11821,6 +11831,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.525
retrieving revision 1.526
diff -u -b -r1.525 -r1.526
--- fr.po       11 Apr 2021 12:03:09 -0000      1.525
+++ fr.po       11 Apr 2021 13:04:29 -0000      1.526
@@ -5412,6 +5412,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -10051,6 +10061,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- it.po       11 Apr 2021 12:03:10 -0000      1.300
+++ it.po       11 Apr 2021 13:04:29 -0000      1.301
@@ -5919,6 +5919,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -10417,6 +10427,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- ja.po       11 Apr 2021 12:03:10 -0000      1.308
+++ ja.po       11 Apr 2021 13:04:29 -0000      1.309
@@ -4611,6 +4611,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -8225,6 +8235,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- malware-google.de-diff.html 15 Mar 2021 13:39:23 -0000      1.55
+++ malware-google.de-diff.html 11 Apr 2021 13:04:29 -0000      1.56
@@ -444,24 +444,35 @@
 
 &lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Google 
Surveillance&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
+      sometimes very clever. Some trackers can</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where</em></ins></span> a <span 
class="removed"><del><strong>user's movements around</strong></del></span> 
<span class="inserted"><ins><em>document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202008030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Nest &lt;a
     
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
-    is taking over ADT&lt;/a&gt;. Google sent out a</em></ins></span> software 
<span class="removed"><del><strong>in popular Android apps</strong></del></span>
-    <span class="inserted"><ins><em>update to its speaker devices using their 
back door &lt;a
+    is taking over ADT&lt;/a&gt;. Google sent out</em></ins></span> a <span 
class="removed"><del><strong>physical store</strong></del></span> <span 
class="inserted"><ins><em>software
+    update to its speaker devices using their back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>happening. This means the devices now listen for more
+    that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
-    out prematurely</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store</strong></del></span> 
<span class="inserted"><ins><em>on accident and Google was planning on 
disclosing
+    out prematurely and on accident and Google was planning on disclosing
     this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -865,7 +876,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/15 13:39:23 $
+$Date: 2021/04/11 13:04:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-google.de.po        12 Mar 2021 09:03:44 -0000      1.68
+++ malware-google.de.po        11 Apr 2021 13:04:29 -0000      1.69
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -739,6 +739,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-google.es.po        12 Mar 2021 12:02:57 -0000      1.65
+++ malware-google.es.po        11 Apr 2021 13:04:29 -0000      1.66
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-03-12 12:36+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -578,6 +579,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- malware-google.fr.po        12 Mar 2021 10:02:38 -0000      1.120
+++ malware-google.fr.po        11 Apr 2021 13:04:29 -0000      1.121
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-03-12 11:02+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -573,6 +574,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-google.pot  12 Mar 2021 09:03:44 -0000      1.63
+++ malware-google.pot  11 Apr 2021 13:04:30 -0000      1.64
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -415,6 +415,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a "
+"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
+"over personal data of Indian protesters and activists to Indian police</a> "
+"which leaded to their arrest. The cops requested the IP address and the "
+"location where a document was created and with those information, they "
+"identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a "
 
"href=\"https://blog.google/products/google-nest/partnership-adt-smarter-home-security/\";>
 "
 "is taking over ADT</a>. Google sent out a software update to its speaker "

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-google.ru.po        12 Mar 2021 10:01:16 -0000      1.131
+++ malware-google.ru.po        11 Apr 2021 13:04:30 -0000      1.132
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -573,6 +574,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- nl.po       11 Apr 2021 12:03:12 -0000      1.301
+++ nl.po       11 Apr 2021 13:04:30 -0000      1.302
@@ -4298,6 +4298,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -7486,6 +7496,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- pl.po       11 Apr 2021 12:03:12 -0000      1.300
+++ pl.po       11 Apr 2021 13:04:30 -0000      1.301
@@ -3822,6 +3822,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -6943,6 +6953,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- pot 11 Apr 2021 12:03:12 -0000      1.299
+++ pot 11 Apr 2021 13:04:30 -0000      1.300
@@ -3581,6 +3581,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -6602,6 +6612,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-back-doors.de-diff.html 15 Mar 2021 13:39:23 -0000      1.59
+++ proprietary-back-doors.de-diff.html 11 Apr 2021 13:04:32 -0000      1.60
@@ -210,8 +210,8 @@
     requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
     the event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can snoop</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span>
-    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
+    &lt;p&gt;This app is a spyware that can snoop</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone,</strong></del></span>
+    <span class="inserted"><ins><em>sensitive data, including user's 
location</em></ins></span> and <span class="removed"><del><strong>in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
@@ -396,87 +396,75 @@
 
     &lt;p&gt;We link to</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt; which lets Adobe 
control</em></ins></span>
     the <span class="removed"><del><strong>article</strong></del></span> <span 
class="inserted"><ins><em>software and,</em></ins></span> for <span 
class="removed"><del><strong>the facts</strong></del></span> <span 
class="inserted"><ins><em>example, disable</em></ins></span> it <span 
class="removed"><del><strong>presents. It is too bad
-      that</strong></del></span> <span class="inserted"><ins><em>whenever it
+      that the</strong></del></span> <span class="inserted"><ins><em>whenever 
it
     wants. Adobe will block Flash content from running in Flash Player
     beginning January 12, 2021, which indicates that they have access to
     every Flash Player through a back door.&lt;/p&gt;
 
-    &lt;p&gt;The back door won't be dangerous in</em></ins></span> the <span 
class="removed"><del><strong>article finishes by 
advocating</strong></del></span> <span class="inserted"><ins><em>future, as 
it'll disable
-    a proprietary program and make users delete</em></ins></span> the <span 
class="removed"><del><strong>moral weakness</strong></del></span> <span 
class="inserted"><ins><em>software, but it
+    &lt;p&gt;The back door won't be dangerous in the future, as it'll disable
+    a proprietary program and make users delete the software, but it
     was an injustice for many years. Users should have deleted Flash Player
-    even before its end</em></ins></span> of
-      <span class="removed"><del><strong>surrendering to Netflix. The 
Netflix</strong></del></span> <span class="inserted"><ins><em>life.&lt;/p&gt;
+    even before its end of life.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very popular</em></ins></span> app <span 
class="inserted"><ins><em>found in the
-    Google Play store contained a module that was designed 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
-    install</em></ins></span> malware <span 
class="removed"><del><strong>too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>on the user's computer&lt;/a&gt;. The app 
developers
+    &lt;p&gt;A very popular app found in the
+    Google Play store contained a module that was designed to &lt;a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
+    install malware on the user's computer&lt;/a&gt;. The app developers
     regularly used it to make the computer download and execute any code
     they wanted.&lt;/p&gt;
 
     &lt;p&gt;This is a concrete example of what users are exposed to when they
     run nonfree apps. They can never be completely sure that a nonfree
-    app is safe.&lt;/p&gt;</em></ins></span>
+    app is safe.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, 
has</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907100"&gt;
+  &lt;li id="M201907100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears to say that &lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
-    there is</em></ins></span> a back door <span class="inserted"><ins><em>in 
MacOS&lt;/a&gt; for automatically updating some
+    there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
 
-    &lt;p&gt;The specific change described in the article was not
-    malicious&mdash;it protected users from surveillance by third
-    parties&mdash;but</em></ins></span> that <span 
class="removed"><del><strong>&lt;a
-      
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-      can &ldquo;upload files&rdquo; as well as forcibly install 
apps&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;It</strong></del></span> is <span 
class="removed"><del><strong>used by 14,000 Android 
applications.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
separate question.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The specific change described in the</em></ins></span> article 
<span class="removed"><del><strong>finishes</strong></del></span> <span 
class="inserted"><ins><em>was not
+    malicious&mdash;it protected users from surveillance</em></ins></span> by 
<span class="removed"><del><strong>advocating</strong></del></span> <span 
class="inserted"><ins><em>third
+    parties&mdash;but that is a separate question.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;In Android, &lt;a
-      
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-      Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811100"&gt;
+  &lt;li id="M201811100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="inserted"><ins><em>&lt;a
-    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
-    back door <span class="inserted"><ins><em>that can make it 
cease</em></ins></span> to <span class="removed"><del><strong>remotely delete 
apps.&lt;/a&gt;  (It was in</strong></del></span> <span 
class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article is full of confusions, errors and biases that we have
-    an obligation to expose, given that we are making</em></ins></span> a
-      <span class="removed"><del><strong>program called GTalkService, which 
seems since then</strong></del></span> <span 
class="inserted"><ins><em>link</em></ins></span> to <span 
class="removed"><del><strong>have been
-      merged into Google Play.)&lt;/p&gt;
-    &lt;p&gt;Google can also &lt;a
-      
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-      forcibly and remotely install apps&lt;/a&gt; through GTalkService.
-      This is</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does</em></ins></span> not <span 
class="removed"><del><strong>equivalent</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;enable&rdquo; a company to do
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
     any particular thing in its products. What it does enable the company
     to do is sue other companies if they do some particular thing in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when</em></ins></span> to <span 
class="inserted"><ins><em>attack users through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, but permits various
-      dirty tricks.&lt;/p&gt;
-    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-      malicious so far,</strong></del></span>
-    <span class="inserted"><ins><em>door are beside</em></ins></span> the 
<span class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting the back door</em></ins></span> is 
<span class="removed"><del><strong>that nobody</strong></del></span> <span 
class="inserted"><ins><em>wrong in the
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
     first place, and using the back door is always wrong too. No software
-    developer</em></ins></span> should have <span 
class="removed"><del><strong>such power,
-      which could also</strong></del></span> <span 
class="inserted"><ins><em>that power over users.&lt;/li&gt;
+    developer should have that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
@@ -493,7 +481,7 @@
     because neighbors' kids are playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
     to the boundary line, not even with a jackhammer, because it is an
-    abstraction and can't</em></ins></span> be <span 
class="inserted"><ins><em>affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;
   &lt;/li&gt;
 
@@ -519,7 +507,7 @@
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is</em></ins></span> used <span 
class="removed"><del><strong>maliciously.  You</strong></del></span> <span 
class="inserted"><ins><em>by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201112080"&gt;
@@ -530,7 +518,7 @@
     
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You</em></ins></span> might well decide to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>let a security service that you trust
+    &lt;p&gt;You might well decide to let a security service that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
     But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
     should have the right to decide whom (if anyone) to trust in this
@@ -598,41 +586,63 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Wavelink and JetStream wifi routers have
     universal back doors that enable unauthenticated
-    users to remotely control not only the routers, but
-    also any devices connected to the network. There is evidence that &lt;a
-    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
-    this vulnerability is actively exploited&lt;/a&gt;.&lt;/p&gt;
+    users to remotely control not only</em></ins></span> the <span 
class="removed"><del><strong>moral weakness of
+      surrendering</strong></del></span> <span 
class="inserted"><ins><em>routers, but
+    also any devices connected</em></ins></span> to <span 
class="removed"><del><strong>Netflix. The Netflix
+      app &lt;a 
href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back 
door</strong></del></span> <span class="inserted"><ins><em>the network. There 
is evidence</em></ins></span> that &lt;a
+      <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+      can &ldquo;upload files&rdquo; as well as forcibly install 
apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"&gt;
+    this vulnerability</em></ins></span> is <span 
class="removed"><del><strong>used by 14,000 Android applications.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;If you consider buying a router, we encourage you to get one
+  &lt;li&gt;
+    &lt;p&gt;In Android, &lt;a
+      
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+      Google has</strong></del></span> <span 
class="inserted"><ins><em>actively exploited&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you consider buying</em></ins></span> a <span 
class="removed"><del><strong>back door</strong></del></span> <span 
class="inserted"><ins><em>router, we encourage you</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps.&lt;/a&gt;  (It 
was</strong></del></span> <span class="inserted"><ins><em>get one
     that &lt;a href="https://ryf.fsf.org/categories/routers"&gt;runs on free
-    software&lt;/a&gt;. Any attempts at introducing malicious functionalities 
in
-    it (e.g., through a firmware update) will be detected by the community,
+    software&lt;/a&gt;. Any attempts at introducing malicious 
functionalities</em></ins></span> in
+    <span class="inserted"><ins><em>it (e.g., through</em></ins></span> a
+      <span class="removed"><del><strong>program called GTalkService, which 
seems since then</strong></del></span> <span class="inserted"><ins><em>firmware 
update) will be detected by the community,
     and soon corrected.&lt;/p&gt;
 
     &lt;p&gt;If unfortunately you own a router that runs on
-    proprietary software, don't panic! You may be able to
-    replace its firmware with a free operating system such as &lt;a
+    proprietary software, don't panic! You may be able</em></ins></span> to 
<span class="removed"><del><strong>have been
+      merged into Google Play.)&lt;/p&gt;
+    &lt;p&gt;Google</strong></del></span>
+    <span class="inserted"><ins><em>replace its firmware with a free operating 
system such as &lt;a
     href="https://librecmc.org"&gt;libreCMC&lt;/a&gt;. If you don't know how,
-    you can get help from a nearby GNU/Linux user group.&lt;/p&gt;
+    you</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>get help from a nearby GNU/Linux user group.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202011060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A new app published by Google &lt;a
-    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
+    &lt;p&gt;A new app published by Google</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+      forcibly</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
     banks and creditors deactivate people's Android devices&lt;/a&gt; if they
     fail to make payments. If someone's device gets deactivated, it will
-    be limited to basic functionality, such as emergency calling and
-    access to settings.&lt;/p&gt;
+    be limited to basic functionality, such as emergency 
calling</em></ins></span> and
+    <span class="inserted"><ins><em>access to settings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202007010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BMW will remotely &lt;a
+    &lt;p&gt;BMW will</em></ins></span> remotely <span 
class="removed"><del><strong>install apps&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
-    enable and disable functionality in cars&lt;/a&gt; through a universal
+    enable and disable functionality in cars&lt;/a&gt;</em></ins></span> 
through <span class="removed"><del><strong>GTalkService.
+      This is</strong></del></span> <span class="inserted"><ins><em>a universal
     back door.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -643,9 +653,13 @@
     Google Play Terms of Service&lt;/a&gt; insist that the user of Android 
accept
     the presence of universal back doors in apps released by Google.&lt;/p&gt;
 
-    &lt;p&gt;This does not tell us whether any of Google's apps currently
-    contains a universal back door, but that is a secondary question.
-    In moral terms, demanding that people accept in advance certain bad
+    &lt;p&gt;This does</em></ins></span> not <span 
class="removed"><del><strong>equivalent to</strong></del></span> <span 
class="inserted"><ins><em>tell us whether any of Google's apps currently
+    contains</em></ins></span> a universal back door, but <span 
class="removed"><del><strong>permits various
+      dirty tricks.&lt;/p&gt;
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+      malicious so far, the point</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> is <span 
class="inserted"><ins><em>a secondary question.
+    In moral terms, demanding</em></ins></span> that <span 
class="removed"><del><strong>nobody should have such power,
+      which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>people accept in 
advance certain bad
     treatment is equivalent to actually doing it.  Whatever condemnation
     the latter deserves, the former deserves the same.&lt;/p&gt;
   &lt;/li&gt;
@@ -660,7 +674,7 @@
 
     &lt;p&gt;The adware is in a modified version of an
     essential system configuration app. The back door is a
-    surreptitious addition to</em></ins></span> a
+    surreptitious addition</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> a
       <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
       considers malicious.  But there</strong></del></span> <span 
class="inserted"><ins><em>program whose stated purpose</em></ins></span> is 
<span class="removed"><del><strong>no excuse</strong></del></span> <span 
class="inserted"><ins><em>to be a &lt;a
     
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
@@ -1144,7 +1158,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/15 13:39:23 $
+$Date: 2021/04/11 13:04:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary-back-doors.de.po        25 Feb 2021 17:01:56 -0000      1.153
+++ proprietary-back-doors.de.po        11 Apr 2021 13:04:32 -0000      1.154
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -631,6 +631,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-back-doors.es.po        26 Feb 2021 10:21:50 -0000      1.60
+++ proprietary-back-doors.es.po        11 Apr 2021 13:04:32 -0000      1.61
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-02-26 11:17+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -504,6 +505,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary-back-doors.fr.po        25 Feb 2021 18:31:19 -0000      1.183
+++ proprietary-back-doors.fr.po        11 Apr 2021 13:04:32 -0000      1.184
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-01-04 17:56+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -503,6 +504,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-back-doors.it-diff.html 15 Mar 2021 13:39:24 -0000      1.85
+++ proprietary-back-doors.it-diff.html 11 Apr 2021 13:04:32 -0000      1.86
@@ -286,8 +286,7 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
       Microsoft has already backdoored</strong></del></span> <span 
class="inserted"><ins><em>remotely unlock an Android device&lt;/a&gt;, 
unless</em></ins></span> its disk <span 
class="removed"><del><strong>encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
-      &lt;a</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span>
     <span class="inserted"><ins><em>is encrypted (possible since Android 5.0 
Lollipop, but still not
     quite the default).&lt;/p&gt;
   &lt;/li&gt;
@@ -303,7 +302,7 @@
   &lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a</em></ins></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
@@ -490,30 +489,39 @@
 
     &lt;p&gt;The back door won't be dangerous in</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>future, as it'll disable
     a proprietary program</em></ins></span> and <span 
class="removed"><del><strong>you
-should have the right to decide who (if anyone) to trust</strong></del></span> 
<span class="inserted"><ins><em>make users delete the software, but it
+should have</strong></del></span> <span class="inserted"><ins><em>make users 
delete</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>software, but it
     was an injustice for many years. Users should have deleted Flash Player
     even before its end of life.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201908270"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very popular app found</em></ins></span> in <span 
class="removed"><del><strong>this way.
+    &lt;p&gt;BMW is trying</em></ins></span> to <span 
class="removed"><del><strong>decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people</em></ins></span> to <span 
class="removed"><del><strong>trust in this way.
 &lt;/p&gt;
 
 &lt;p&gt;
-As these pages show, if you do want</strong></del></span> <span 
class="inserted"><ins><em>the
-    Google Play store contained a module that was designed</em></ins></span> 
to <span class="removed"><del><strong>clean your</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+As these pages show, if you do want</strong></del></span> <span 
class="inserted"><ins><em>pay</em></ins></span> to <span 
class="removed"><del><strong>clean your computer</strong></del></span> <span 
class="inserted"><ins><em>use part</em></ins></span> of <span 
class="removed"><del><strong>malware,</strong></del></span>
+    the <span class="removed"><del><strong>first</strong></del></span> <span 
class="inserted"><ins><em>car they already bought&lt;/a&gt;. This is done 
through forced update
+    of the car</em></ins></span> software <span class="inserted"><ins><em>via 
a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A very popular app found in the
+    Google Play store contained a module that was designed</em></ins></span> 
to <span class="removed"><del><strong>delete</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware on the user's computer&lt;/a&gt;. The app developers
-    regularly used it to make the</em></ins></span> computer <span 
class="inserted"><ins><em>download and execute any code
+    regularly used it to make the computer download and execute any code
     they wanted.&lt;/p&gt;
 
-    &lt;p&gt;This is a concrete example</em></ins></span> of <span 
class="removed"><del><strong>malware,
-the first software</strong></del></span> <span class="inserted"><ins><em>what 
users are exposed</em></ins></span> to <span 
class="removed"><del><strong>delete</strong></del></span> <span 
class="inserted"><ins><em>when they
+    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>Windows or iOS.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a concrete 
example of what users are exposed to when they
     run nonfree apps. They can never be completely sure that a nonfree
-    app</em></ins></span> is <span class="removed"><del><strong>Windows or iOS.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>safe.&lt;/p&gt;</em></ins></span>
+    app is safe.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -567,12 +575,11 @@
     <span class="inserted"><ins><em>door are beside</em></ins></span> the 
<span class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting the back door</em></ins></span> is 
<span class="removed"><del><strong>that nobody</strong></del></span> <span 
class="inserted"><ins><em>wrong in the
     first place, and using the back door is always wrong too. No software
     developer</em></ins></span> should have <span 
class="removed"><del><strong>such power,
-which could also be used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>that power over 
users.&lt;/li&gt;
+which could also</strong></del></span> <span class="inserted"><ins><em>that 
power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>refer to sharing copies is</em></ins></span> a
-<span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>smear;
+    attacking ships. Using that word to refer to sharing copies is a smear;
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
@@ -623,8 +630,8 @@
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
-    remotely &lt;em&gt;deactivate&lt;/em&gt;</em></ins></span> programs that 
it considers malicious.
-    But there is no excuse for <span 
class="removed"><del><strong>allowing</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;deleting&lt;/em&gt; the programs, and you
+    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
     should have the right to decide whom (if anyone) to trust in this
     way.&lt;/p&gt;
   &lt;/li&gt;
@@ -646,10 +653,10 @@
 
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
     malicious so far, the point is that nobody should have such power,
-    which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that</em></ins></span>
-    it <span class="inserted"><ins><em>considers malicious.  But there is no 
excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    which could also</em></ins></span> be used maliciously.  You might well 
decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing it to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt; the programs, 
and you should have the right to decide
     who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -906,7 +913,7 @@
     it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We have found nothing explicitly documenting the lack of any way
-    to disable remote changes</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
the <span class="removed"><del><strong>programs, and you 
should</strong></del></span> <span class="inserted"><ins><em>software, so we 
are not completely
+    to disable remote changes to</em></ins></span> the <span 
class="removed"><del><strong>programs, and you should</strong></del></span> 
<span class="inserted"><ins><em>software, so we are not completely
     sure there isn't one, but this seems pretty clear.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1185,7 +1192,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/15 13:39:24 $
+$Date: 2021/04/11 13:04:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-back-doors.it.po        25 Feb 2021 17:01:56 -0000      1.145
+++ proprietary-back-doors.it.po        11 Apr 2021 13:04:32 -0000      1.146
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -623,6 +623,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-back-doors.ja-diff.html 15 Mar 2021 13:39:24 -0000      1.86
+++ proprietary-back-doors.ja-diff.html 11 Apr 2021 13:04:32 -0000      1.87
@@ -291,14 +291,14 @@
     can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Dell computers, shipped with Windows, had</strong></del></span>
+    &lt;p&gt;Dell computers, shipped</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-    Samsung Galaxy devices running proprietary Android versions come 
with</em></ins></span>
+    Samsung Galaxy devices running proprietary Android versions 
come</em></ins></span> with <span class="removed"><del><strong>Windows, 
had</strong></del></span>
     a <span class="removed"><del><strong>bogus root
       certificate</strong></del></span> <span class="inserted"><ins><em>back 
door&lt;/a&gt;</em></ins></span> that
       <span class="removed"><del><strong>&lt;a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;allowed
@@ -400,22 +400,33 @@
     every Flash Player through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>back door.&lt;/p&gt;
 
     &lt;p&gt;The</em></ins></span> back door <span 
class="inserted"><ins><em>won't be dangerous</em></ins></span> in the <span 
class="removed"><del><strong>modem chip. So
-why did Coolpad bother to introduce another? Because this one is controlled
-by Coolpad.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>future, as 
it'll disable
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>future, as it'll disable
     a proprietary program and make users delete the software, but it
     was an injustice for many years. Users should have deleted Flash Player
-    even before its end of life.&lt;/p&gt;</em></ins></span>
+    even before its end of life.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Microsoft Windows has</strong></del></span>
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>done through forced update
+    of the car software via</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>radio-operated</em></ins></span> back <span 
class="removed"><del><strong>door through which</strong></del></span> <span 
class="inserted"><ins><em>door.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201908270"&gt;
+  &lt;li id="M201908270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A very popular app found in the
-    Google Play store contained</em></ins></span> a <span 
class="removed"><del><strong>universal back door through 
which</strong></del></span> <span class="inserted"><ins><em>module that was 
designed to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+    Google Play store contained a module that was designed 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
 any change whatsoever can be imposed</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/"&gt;secretly
     install malware</em></ins></span> on the <span 
class="removed"><del><strong>users&lt;/a&gt;.
@@ -477,24 +488,24 @@
 remote wipe&lt;/a&gt;.  It's</strong></del></span> <span 
class="inserted"><ins><em>link to them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does</em></ins></span> not <span 
class="removed"><del><strong>always enabled, but users are led into enabling
+    &lt;li&gt;Getting a patent does</em></ins></span> not <span 
class="removed"><del><strong>always enabled, but</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack</em></ins></span> 
users <span class="inserted"><ins><em>through a back
+    door</em></ins></span> are <span class="removed"><del><strong>led into 
enabling
 it without understanding.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,
+  &lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>beside the point. Inserting the back door is wrong in 
the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
     &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;enable&rdquo; a company to do
-    any particular thing in its products. What it does enable the company
-    to do is sue other companies if they do</em></ins></span> some <span 
class="removed"><del><strong>data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>particular thing in
-    their products.&lt;/li&gt;
-
-    &lt;li&gt;A company's policies about when to attack users through a back
-    door are beside</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
   &lt;/p&gt;
-  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting the back door is wrong in the
-    first place, and using the back door is always wrong too. No software
+  &lt;p&gt;This may</strong></del></span> <span class="inserted"><ins><em>back 
door is always wrong too. No software
     developer should</em></ins></span> have <span 
class="removed"><del><strong>improved</strong></del></span> <span 
class="inserted"><ins><em>that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
@@ -1138,7 +1149,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/15 13:39:24 $
+$Date: 2021/04/11 13:04:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary-back-doors.ja.po        25 Feb 2021 17:01:57 -0000      1.129
+++ proprietary-back-doors.ja.po        11 Apr 2021 13:04:32 -0000      1.130
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -482,6 +482,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-back-doors.pot  25 Feb 2021 17:01:57 -0000      1.94
+++ proprietary-back-doors.pot  11 Apr 2021 13:04:32 -0000      1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -358,6 +358,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\";>lock
 "
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a "
 
"href=\"https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/\";>secretly
 "

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary-back-doors.ru.po        25 Feb 2021 17:01:57 -0000      1.226
+++ proprietary-back-doors.ru.po        11 Apr 2021 13:04:32 -0000      1.227
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -491,6 +492,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A very popular app found in the Google Play store contained a module that "
 "was designed to <a href=\"https://arstechnica.com/information-";
 "technology/2019/08/google-play-app-with-100-million-downloads-executed-"

Index: proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-manipulation.es.po      12 Mar 2021 12:02:57 -0000      1.20
+++ proprietary-manipulation.es.po      11 Apr 2021 13:04:32 -0000      1.21
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2021-03-12 12:39+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -145,6 +146,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-manipulation.fr.po      12 Mar 2021 10:02:38 -0000      1.19
+++ proprietary-manipulation.fr.po      11 Apr 2021 13:04:32 -0000      1.20
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2021-03-12 11:02+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -139,6 +140,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-manipulation.pot        12 Mar 2021 09:03:44 -0000      1.12
+++ proprietary-manipulation.pot        11 Apr 2021 13:04:32 -0000      1.13
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -111,6 +111,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\";>lock
 "
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a "
 
"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\";>
 "
 "tool for propaganda</a> by natalist Christians.  It spreads distrust for "

Index: proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-manipulation.ru.po      12 Mar 2021 10:01:17 -0000      1.16
+++ proprietary-manipulation.ru.po      11 Apr 2021 13:04:32 -0000      1.17
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -140,6 +141,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Femm &ldquo;fertility&rdquo; app is secretly a <a href=\"https://www.";
 "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
 "anti-abortion-campaigners\"> tool for propaganda</a> by natalist "

Index: proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-subscriptions.de-diff.html      15 Mar 2021 13:39:26 -0000      
1.34
+++ proprietary-subscriptions.de-diff.html      11 Apr 2021 13:04:32 -0000      
1.35
@@ -104,6 +104,16 @@
     to have this sort of power.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910071"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -249,7 +259,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/15 13:39:26 $
+$Date: 2021/04/11 13:04:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-subscriptions.de.po     18 Jan 2021 13:10:33 -0000      1.37
+++ proprietary-subscriptions.de.po     11 Apr 2021 13:04:32 -0000      1.38
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -199,6 +199,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "

Index: proprietary-subscriptions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-subscriptions.es.po     19 Jan 2021 10:00:40 -0000      1.27
+++ proprietary-subscriptions.es.po     11 Apr 2021 13:04:32 -0000      1.28
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2021-01-19 10:35+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 "Plural-Forms: nplurals=2;plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -142,6 +143,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "

Index: proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-subscriptions.fr.po     18 Jan 2021 13:10:33 -0000      1.57
+++ proprietary-subscriptions.fr.po     11 Apr 2021 13:04:32 -0000      1.58
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2020-10-17 10:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -137,6 +138,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "

Index: proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-subscriptions.ja-diff.html      15 Mar 2021 13:39:26 -0000      
1.44
+++ proprietary-subscriptions.ja-diff.html      11 Apr 2021 13:04:32 -0000      
1.45
@@ -106,6 +106,16 @@
     to have this sort of power.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201910071"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -249,7 +259,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/15 13:39:26 $
+$Date: 2021/04/11 13:04:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-subscriptions.ja.po     18 Jan 2021 13:10:34 -0000      1.33
+++ proprietary-subscriptions.ja.po     11 Apr 2021 13:04:32 -0000      1.34
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2016-09-16 09:36+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -158,6 +158,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "

Index: proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-subscriptions.pot       18 Jan 2021 13:10:34 -0000      1.30
+++ proprietary-subscriptions.pot       11 Apr 2021 13:04:32 -0000      1.31
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -112,6 +112,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\";>lock
 "
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Adobe has <a "
 
"href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/\";>
 "
 "cancelled the software subscriptions of all users in Venezuela</a>. This "

Index: proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-subscriptions.ru.po     18 Jan 2021 13:10:34 -0000      1.62
+++ proprietary-subscriptions.ru.po     11 Apr 2021 13:04:32 -0000      1.63
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -139,6 +140,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-";
 "ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
 "software subscriptions of all users in Venezuela</a>. This demonstrates how "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary-surveillance.de-diff.html       16 Mar 2021 17:33:27 -0000      
1.176
+++ proprietary-surveillance.de-diff.html       11 Apr 2021 13:04:32 -0000      
1.177
@@ -646,18 +646,11 @@
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
-    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
-    worked in various ways to prevent that, and deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for the snooping of these apps.&lt;/p&gt;
-
-  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>specific
+    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
-    being nonfree. It also distributes</strong></del></span> its
-    own <span class="removed"><del><strong>nonfree apps,</strong></del></span> 
<span class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -681,66 +674,31 @@
     &lt;p&gt;The proprietary program Clubhouse
     is malware and a privacy disaster. Clubhouse &lt;a
     
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
-    people's personal data</em></ins></span> such as
-    <span class="removed"><del><strong>Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>recordings</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
-    cheating?  There is no systematic way for Google, or Android
-    users, to inspect executable proprietary apps to see what they
-    do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand the source code for these apps, and study the
-    source code somehow to determine whether they mistreat users in
-    various ways. If it did</strong></del></span> <span 
class="inserted"><ins><em>people's
-    conversations&lt;/a&gt;, and, as</em></ins></span> a <span 
class="removed"><del><strong>good job</strong></del></span> <span 
class="inserted"><ins><em>secondary problem, does not encrypt them,
-    which shows a bad security part</em></ins></span> of <span 
class="removed"><del><strong>this, it could more or less
-    prevent such snooping, except when</strong></del></span> the <span 
class="removed"><del><strong>app developers</strong></del></span> <span 
class="inserted"><ins><em>issue.&lt;/p&gt;
-
-    &lt;p&gt;A user's unique Clubhouse ID number and chatroom 
ID</em></ins></span> are <span class="removed"><del><strong>clever
-    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>transmitted
-    in plaintext, and Agora (the company behind</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+    people's personal data such as recordings of people's
+    conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
+    which shows a bad security part of the issue.&lt;/p&gt;
+
+    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
+    in plaintext, and Agora (the company behind the app) would likely
+    have access to users' raw audio, potentially providing access to
+    the Chinese government.&lt;/p&gt;
 
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</strong></del></span> <span class="inserted"><ins><em>app) would 
likely
-    have access</em></ins></span> to <span 
class="removed"><del><strong>protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>users' raw audio, 
potentially providing access</em></ins></span> to
-    the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated the privacy 
and</strong></del></span> <span class="inserted"><ins><em>Chinese 
government.&lt;/p&gt;
-
-    &lt;p&gt;Even with good</em></ins></span> security of <span 
class="removed"><del><strong>283 Android VPN apps concluded that &ldquo;in 
spite</strong></del></span> <span class="inserted"><ins><em>data transmission, 
collecting personal
-    data</em></ins></span> of <span class="removed"><del><strong>the
-    promises for privacy, security,</strong></del></span> <span 
class="inserted"><ins><em>people is wrong</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by the
-    majority</strong></del></span> <span class="inserted"><ins><em>a 
violation</em></ins></span> of <span class="removed"><del><strong>VPN 
apps&mdash;millions</strong></del></span> <span 
class="inserted"><ins><em>people's privacy rights.&lt;/p&gt;
+    &lt;p&gt;Even with good security of data transmission, collecting personal
+    data of people is wrong and a violation of people's privacy 
rights.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one</em></ins></span> of <span 
class="inserted"><ins><em>Facebook's subsidiaries) is &lt;a
+    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
     
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its</em></ins></span> users <span class="removed"><del><strong>may be 
unawarely subject</strong></del></span> to <span 
class="removed"><del><strong>poor security guarantees and abusive practices 
inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
+    its users to hand over sensitive personal data&lt;/a&gt; to its parent
+    company. This increases Facebook's power over users, and further
+    jeopardizes people's privacy and security.&lt;/p&gt;
 
-  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
-    the research paper that tracks</strong></del></span> <span 
class="inserted"><ins><em>hand over sensitive personal data&lt;/a&gt; to its 
parent
-    company. This increases Facebook's power over users,</em></ins></span> and 
<span class="removed"><del><strong>infringes the</strong></del></span> <span 
class="inserted"><ins><em>further
-    jeopardizes people's</em></ins></span> privacy <span 
class="inserted"><ins><em>and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries such as 
NativeX</strong></del></span> <span class="inserted"><ins><em>WhatsApp you can 
use &lt;a
+    &lt;p&gt;Instead of WhatsApp you can use &lt;a
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software</em></ins></span> and <span 
class="removed"><del><strong>Appflood,
-      meant to track</strong></del></span> <span 
class="inserted"><ins><em>will not collect your data.&lt;/p&gt;
+    free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006260"&gt;
@@ -749,57 +707,33 @@
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
     
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>and show</strong></del></span> <span 
class="inserted"><ins><em>as well
-    as snooping on</em></ins></span> them <span 
class="removed"><del><strong>targeted ads.&lt;/dd&gt;
-
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</strong></del></span> <span 
class="inserted"><ins><em>itself&lt;/a&gt;.&lt;/p&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says that Biden's app has a less manipulative overall
-    approach, but that does not tell us whether</em></ins></span> it has <span 
class="removed"><del><strong>full access to
-      users' text messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>functionalities we
-    consider malicious, such as sending data</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>user has not 
explicitly
-    asked</em></ins></span> to <span class="removed"><del><strong>read logs
-      for other apps</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;
+    approach, but that does not tell us whether it has functionalities we
+    consider malicious, such as sending data the user has not explicitly
+    asked to send.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809121"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>three other 
companies are facing a lawsuit &lt;a
+    by Google, Twitter and three other companies are facing a lawsuit &lt;a
     
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile 
games</em></ins></span>
-    and <span class="removed"><del><strong>may turn them</strong></del></span> 
<span class="inserted"><ins><em>handing</em></ins></span> over <span 
class="inserted"><ins><em>these data</em></ins></span> to <span 
class="removed"><del><strong>the UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose</strong></del></span> <span 
class="inserted"><ins><em>other companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+    violating people's privacy by collecting their data from mobile games
+    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>the JS injection</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span class="inserted"><ins><em>make sure they 
can't &ldquo;fool&rdquo;</em></ins></span>
-    the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
@@ -808,59 +742,37 @@
     &lt;p&gt;According to Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>non-premium version of</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app does
-      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
-    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>web 
browsing history, and
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
     read the contact list. This malware is designed to disguise itself
-    from investigation.&lt;/p&gt;</em></ins></span>
+    from investigation.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
+  &lt;li id="M201311120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found that 90% of the top-ranked 
gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>smart phones, including iPhones,
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here,</em></ins></span> it <span class="removed"><del><strong>was 
only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are</strong></del></span> <span 
class="inserted"><ins><em>seems that this does</em></ins></span> not <span 
class="removed"><del><strong>in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>operate 
via</em></ins></span>
-    the <span class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A 
good replacement
-  for</strong></del></span> <span class="inserted"><ins><em>universal back 
door</em></ins></span> that <span class="removed"><del><strong>word is 
&ldquo;exploit&rdquo;;</strong></del></span> <span class="inserted"><ins><em>we 
know</em></ins></span> nearly <span class="removed"><del><strong>always that 
will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all portable
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+  &lt;li id="M201307000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and</em></ins></span> 
users <span class="removed"><del><strong>could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cannot 
stop
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location on remote command, and users cannot stop
     them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;</em></ins></span>
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -872,47 +784,29 @@
   &lt;li id="M202009183"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or 
played</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surreptitously turning on the device's
-    camera.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Facebook &lt;a
+    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
+    camera.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202004200"&gt;
+  &lt;li id="M202004200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude</strong></del></span> 
<span class="inserted"><ins><em>surreptitiously activating the Siri 
software</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    made a practice of surreptitiously activating the Siri software to &lt;a
     
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
-    record</em></ins></span> users' <span class="removed"><del><strong>personal
-       data</strong></del></span> <span 
class="inserted"><ins><em>conversations when they had not activated 
Siri&lt;/a&gt;.
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
-    &lt;p&gt;His job was</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users</strong></del></span> <span 
class="inserted"><ins><em>listen to these recordings, in a 
group</em></ins></span> that <span class="removed"><del><strong>install the 
app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>made
-    transcripts</em></ins></span> of <span class="removed"><del><strong>users 
is</strong></del></span> <span class="inserted"><ins><em>them. He 
does</em></ins></span> not <span 
class="removed"><del><strong>enough</strong></del></span> <span 
class="inserted"><ins><em>believes that Apple has ceased this
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
     practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span 
class="inserted"><ins><em>prevent</em></ins></span> this <span 
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>is, 
for</em></ins></span> the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>program</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span>
-    <span class="inserted"><ins><em>controls access to the microphone to 
decide when the user has
-    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span class="removed"><del><strong>honestly 
identify</strong></del></span> the <span 
class="removed"><del><strong>information it collects on users, instead
-of hiding</strong></del></span>
-    <span class="inserted"><ins><em>operating system under</em></ins></span> 
it <span class="inserted"><ins><em>free as well. This way, users could make
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
     sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -921,120 +815,47 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices</em></ins></span> in <span 
class="removed"><del><strong>an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>China</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>check URLs that possibly 
correspond</em></ins></span> to <span class="removed"><del><strong>obey the 
user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;fraudulent&rdquo; websites. Since 
Tencent collaborates</em></ins></span>
-    with <span class="removed"><del><strong>free software.&lt;/p&gt;
-
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span> the <span 
class="inserted"><ins><em>Chinese government, its Safe Browsing black 
list</em></ins></span> most <span class="removed"><del><strong>popular Android 
apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly
-    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+  &lt;li id="M201905280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>the app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps 
<span class="removed"><del><strong>as
-  &ldquo;free&rdquo;&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span 
class="removed"><del><strong>not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>busy at night &lt;a
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>takes for granted 
that the usual analytics tools are
-  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android</strong></del></span> <span 
class="inserted"><ins><em>most nonfree</em></ins></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.</strong></del></span> <span class="inserted"><ins><em>contain
-    trackers.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>of these</em></ins></span> send <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>personally identifying</em></ins></span> data <span 
class="removed"><del><strong>to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package</strong></del></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>phone
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
+    delivery address (in the case of DoorDash). Once this information
     is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    used for.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+  &lt;li id="M201711250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The</em></ins></span> DMCA and 
the EU Copyright Directive make it &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS <span 
class="removed"><del><strong>cr...apps</strong></del></span> <span 
class="inserted"><ins><em>cr&hellip;apps</em></ins></span> spy on 
users&lt;/a&gt;, because
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+  &lt;li id="M201709210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In</em></ins></span> the latest iThings system,
+    &lt;p&gt;In the latest iThings system,
     &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
@@ -1042,64 +863,43 @@
     know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+  &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple</em></ins></span> proposes &lt;a
+    &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
-      &mdash; which</strong></del></span> <span 
class="inserted"><ins><em>screen&lt;/a&gt;&mdash;which</em></ins></span> would 
mean no way
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+  &lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> iMessage app on iThings &lt;a
+    &lt;p&gt;The iMessage app on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
     a server every phone number that the user types into it&lt;/a&gt;; the
     server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+  &lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
     take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. <span 
class="removed"><del><strong>[...]</strong></del></span> <span 
class="inserted"><ins><em>[&hellip;]</em></ins></span> 
&lt;/p&gt;&lt;/blockquote&gt;
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
@@ -1115,11 +915,8 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
@@ -1142,23 +939,21 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the &lt;a
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &lt;a</em></ins></span> class="not-a-duplicate"
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
+  &lt;li id="M201312300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -1179,65 +974,39 @@
   &lt;li id="M201210170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+  &lt;li id="M201204280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
-    to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202012070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Baidu</em></ins></span> apps <span class="inserted"><ins><em>were 
&lt;a
+    &lt;p&gt;Baidu apps were &lt;a
     
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
     caught collecting sensitive personal data&lt;/a&gt; that can be used for
     lifetime tracking of users, and putting them in danger. More than 1.4
     billion people worldwide are affected by these proprietary apps, and
-    users' privacy</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>jeopardized by this surveillance tool. Data collected
+    users' privacy is jeopardized by this surveillance tool. Data collected
     by Baidu may be handed over to the Chinese government, possibly
     putting Chinese people in danger.&lt;/p&gt;
   &lt;/li&gt;
@@ -1248,46 +1017,32 @@
     &lt;p&gt;Samsung is forcing its smartphone users in Hong Kong (and Macau) 
&lt;a
     
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/"&gt;to
     use a public DNS in Mainland China&lt;/a&gt;, using software update 
released
-    in September 2020, which causes many unease</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> <span class="inserted"><ins><em>privacy 
concerns.&lt;/p&gt;
+    in September 2020, which causes many unease and privacy concerns.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202004300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking 
at</em></ins></span> a <span class="removed"><del><strong>user's movements 
around</strong></del></span> <span class="inserted"><ins><em>folder,
-    visiting</em></ins></span> a <span class="removed"><del><strong>physical 
store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Android tracks location for Google</strong></del></span> 
<span class="inserted"><ins><em>website, listening to a song.  They send device 
identifying
+    &lt;p&gt;Xiaomi phones &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
+    visiting a website, listening to a song.  They send device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
-    other streaming dis-services make a dossier about each user, 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, 
even</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210"&gt;
 they make
+    other streaming dis-services make a dossier about each user, and &lt;a
+    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
     users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
 
-    &lt;p&gt;Forbes exonerates the same wrongs</em></ins></span> when the 
<span class="removed"><del><strong>phone has</strong></del></span> <span 
class="inserted"><ins><em>culprits are not Chinese,
-    but we condemn this</em></ins></span> no <span 
class="removed"><del><strong>SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>matter who does it.&lt;/p&gt;
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201812060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
     what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
@@ -1295,13 +1050,11 @@
   &lt;li id="M201811230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An Android phone was observed</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>track location even while
+    &lt;p&gt;An Android phone was observed to track location even while
     in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up</em></ins></span> the <span class="removed"><del><strong>phones
-      on</strong></del></span> <span 
class="inserted"><ins><em>data,</em></ins></span> and <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -1309,8 +1062,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
@@ -1318,7 +1071,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
@@ -1326,159 +1079,86 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+  &lt;li id="M201507030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some
-      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201403120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>system.&lt;/p&gt;</em></ins></span>
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+  &lt;li id="M201308010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+  &lt;li id="M201307280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
-      the use of data on the user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where</strong></del></span> <span class="inserted"><ins><em>some 
Android devices when</em></ins></span> they <span 
class="removed"><del><strong>travel before and after going 
to</strong></del></span> <span class="inserted"><ins><em>are
+    &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>modified 
version of Android that &lt;a
+    by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+  &lt;li id="M201307250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
Sarahah</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+  &lt;li id="M201302150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> the <span 
class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>time, 
&lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out</em></ins></span> what <span 
class="removed"><del><strong>people</strong></del></span>
-    <span class="inserted"><ins><em>they</em></ins></span> are <span 
class="removed"><del><strong>listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
-    honestly identify the information</em></ins></span> it <span 
class="removed"><del><strong>may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
-       &lt;/li&gt;
-
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots</strong></del></span> <span 
class="inserted"><ins><em>collects on users, instead</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span>
-    <span class="inserted"><ins><em>hiding</em></ins></span> it <span 
class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
-    and other companies from getting this</em></ins></span> personal <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> in the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1495,20 +1175,15 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;E-books can contain JavaScript code, and &lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>some of its phones. The app will give Verizon the 
same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
     send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
@@ -1516,17 +1191,11 @@
   &lt;li id="M201212030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not</em></ins></span> only <span 
class="removed"><del><strong>one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before</strong></del></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>Kindle: &lt;a
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -1545,56 +1214,25 @@
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After</em></ins></span>
-    a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span> <span class="inserted"><ins><em>public outburst, 
Microsoft stated that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in the phone,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    snoop on each employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that &lt;a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>AVG extensions
-    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates</strong></del></span> <span 
class="inserted"><ins><em>problematic extensions from their stores, but this 
shows
-    once more</em></ins></span> how <span 
class="removed"><del><strong>&ldquo;getting the user's consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance</strong></del></span> <span 
class="inserted"><ins><em>unsafe nonfree</em></ins></span> software <span 
class="removed"><del><strong>snoop on what radio and TV 
programs</strong></del></span> <span class="inserted"><ins><em>can be. Tools 
that</em></ins></span> are <span class="removed"><del><strong>playing 
nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span>
-    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>protect a proprietary system are, instead, infecting 
it with
-    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>original malware).&lt;/p&gt;
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
@@ -1602,13 +1240,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
@@ -1626,35 +1264,22 @@
     &lt;p&gt;Many cr&hellip;apps, developed by various
     companies for various organizations, do &lt;a
     
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown</em></ins></span> to <span 
class="inserted"><ins><em>those companies and those
-    organizations&lt;/a&gt;.  It's actually</em></ins></span> some
-      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span class="inserted"><ins><em>widely used 
libraries that do</em></ins></span>
-    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>tracking.&lt;/p&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
 
     &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A</em></ins></span> to <span class="removed"><del><strong>be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>mistreat</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>end user.&lt;/p&gt;
+    A to mistreat the end user.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>Zoom &lt;a
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
     
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending</em></ins></span> users' <span 
class="removed"><del><strong>pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>data to 
Facebook&lt;/a&gt;</em></ins></span> even if the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
-    a Facebook account. According</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM</strong></del></span> <span 
class="inserted"><ins><em>article, Zoom</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
     don't even mention this surveillance on their privacy policy page,
     making this an obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;
@@ -1664,99 +1289,62 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    estimates whether the user has Covid-19 and &lt;a
     
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is</strong></del></span> <span class="inserted"><ins><em>United Arab 
Emirates&lt;/a&gt;.
-    Any nonfree program could be</em></ins></span> doing <span 
class="removed"><del><strong>this in a way</strong></del></span> <span 
class="inserted"><ins><em>this, and</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> is <span 
class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>a good
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and that is a good
     reason to use free software instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>word &ldquo;free&rdquo; in
-    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+  &lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when</em></ins></span> used <span class="inserted"><ins><em>for work, give 
employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>device.  Many 
employers demand</em></ins></span> to <span class="inserted"><ins><em>do this.  
For</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
-    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>as dangerous as 
any other nonfree software.&lt;/p&gt;
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>developers get</strong></del></span> 
<span class="inserted"><ins><em>requires</em></ins></span> users to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>grant</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>contain a
-    back-door allowing developers</em></ins></span> to <span 
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span 
class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
-    app <span class="removed"><del><strong>developer</strong></del></span> 
<span class="inserted"><ins><em>is mandatory at some workplaces.&lt;/p&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly 
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
-      ask about sending it to other companies.  This 
shows</strong></del></span>
-    <span class="inserted"><ins><em>readable after copy-pasting in a text 
editor) includes a clarification
-    saying that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android 
version</em></ins></span>
-    of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a 
flashlight</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
@@ -1764,113 +1352,65 @@
   &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>send any information to anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
     tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
+    into giving the app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>broad permissions</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>order</em></ins></span> to <span 
class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
-    functionalities.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+  &lt;li id="M201909090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based 
in</strong></del></span> <span class="inserted"><ins><em>proprietary
+    &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
     proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>list of all</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This</strong></del></span> <span 
class="inserted"><ins><em>free program there</em></ins></span> would
-      <span class="removed"><del><strong>enable crackers to listen in 
on</strong></del></span> <span class="inserted"><ins><em>not 
be</em></ins></span> a <span class="removed"><del><strong>child's speech, and 
even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>list of who has installed
-    it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+  &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
-    of <span class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>gather as much private</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>data broker would have been able to figure out
-      who</strong></del></span> <span class="inserted"><ins><em>software we 
run.&lt;/p&gt;
+    having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span class="removed"><del><strong>pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>allow them 
access</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+  &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
@@ -1881,10 +1421,10 @@
   &lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>be allowed into</em></ins></span>
-    the <span 
class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>event.&lt;/p&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
 
     &lt;p&gt;This app is a spyware that can snoop on a lot of
     sensitive data, including user's location and contact list, and has &lt;a
@@ -1895,102 +1435,53 @@
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data</em></ins></span> collected by <span 
class="inserted"><ins><em>menstrual and pregnancy monitoring apps is often &lt;a
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</strong></del></span>
-    <span class="inserted"><ins><em>data is 
&ldquo;anonymized</em></ins></span> and <span 
class="inserted"><ins><em>aggregated,&rdquo; it can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom</em></ins></span> to <span class="inserted"><ins><em>make 
their own pregnancy choices. Don't use</em></ins></span>
-    these <span class="removed"><del><strong>conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>apps, even if 
someone offers you a reward</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>do so. A
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
     free-software app that does more or less the same thing without
-    spying</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
-    
href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,</em></ins></span>
 and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a</em></ins></span> new <span class="removed"><del><strong>items on top 
under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>one</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>being developed&lt;/a&gt;.&lt;/p&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google tracks the movements of Android phones and iPhones
-    running Google apps, and sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="removed"><del><strong>report its</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
-    the</em></ins></span> location <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with 
an</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+  &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> Android <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>have access</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but that could be a
-      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass</em></ins></span> it <span 
class="removed"><del><strong>is certainly surveillance, at
-      least.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> on 
<span class="removed"><del><strong>top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>to 
user-installed apps that have access to
+    the data, or pass it on to user-installed apps that have access to
     the network but no direct access to the data. This results in massive
     surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A study of 24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>poor
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
@@ -2002,56 +1493,30 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt; on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing</em></ins></span> that <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>personal
+    way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install 
is</strong></del></span> <span class="inserted"><ins><em>nonfree 
program,</em></ins></span> not <span class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork</strong></del></span> <span 
class="inserted"><ins><em>even the
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
     developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The AppCensus database gives 
information</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
-    misuse users' personal data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
-    78,000 have been analyzed,</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>which 24,000 (31%) transmit the &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
     that the policies of a development platform are ineffective at
@@ -2062,18 +1527,12 @@
   &lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+  &lt;li id="M201902041.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
@@ -2086,13 +1545,8 @@
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2100,15 +1554,11 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users' privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>invasive advertising&mdash;that could
+    source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
@@ -2118,15 +1568,10 @@
 
     &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
+  &lt;li id="M201901050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Weather Channel app &lt;a
@@ -2274,10 +1719,10 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    &lt;p&gt;Google did not intend to make these apps spy; on 
the</em></ins></span> contrary, it
     worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for the <span class="removed"><del><strong>snooping</strong></del></span> 
<span class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
@@ -2336,23 +1781,39 @@
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>these apps.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+  &lt;p&gt;On</strong></del></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps, and
+    therefore shares in</strong></del></span> <span 
class="inserted"><ins><em>audio files users listen to
+    along with</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without</em></ins></span> the 
<span class="removed"><del><strong>injustice</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>their
+    being nonfree.</strong></del></span> <span class="inserted"><ins><em>the 
app said that users gave consent for this,
+    would that make it acceptable? No way!</em></ins></span> It <span 
class="removed"><del><strong>also distributes its own nonfree apps, such as
+    Google
+    Play,</strong></del></span> <span class="inserted"><ins><em>should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
+    cheating?  There is no systematic way for Google, or</strong></del></span> 
Android
+    <span class="removed"><del><strong>users, to inspect executable 
proprietary</strong></del></span> apps <span class="inserted"><ins><em>can 
collude</em></ins></span>
+    to <span class="removed"><del><strong>see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these apps, and study the
+    source code somehow</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to 
<span class="removed"><del><strong>determine whether they mistreat users in
+    various ways. If it did a good job</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    study found tens</em></ins></span> of <span 
class="removed"><del><strong>this,</strong></del></span> <span 
class="inserted"><ins><em>thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
@@ -2360,16 +1821,21 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    announced an opt-in proprietary search app that</em></ins></span> it <span 
class="removed"><del><strong>could more or less
+    prevent such snooping, except</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install
     on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
+    about the users' searches that Google normally gets</em></ins></span> when 
<span class="inserted"><ins><em>they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
+    &lt;p&gt;Currently,</em></ins></span> the app <span 
class="removed"><del><strong>developers are clever
+    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    being pre-installed on only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> must <span 
class="removed"><del><strong>demand release</strong></del></span>
+    <span class="inserted"><ins><em>explicitly opt-in before the app takes 
effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2378,7 +1844,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -2386,16 +1852,18 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201611160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -2404,11 +1872,15 @@
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
+    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;
+    &lt;dl class="compact"&gt;</em></ins></span>
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
@@ -2430,22 +1902,62 @@
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
+      roughly <span class="removed"><del><strong>5</strong></del></span> <span 
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it 
redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5 tracking libraries. Developers of this app 
have
+      confirmed that the non-premium version of the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
     &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable</strong></del></span>
+      <span class="inserted"><ins><em>five</em></ins></span> tracking <span 
class="removed"><del><strong>libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
+       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span> <span 
class="inserted"><ins><em>libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>the non-premium version of the app does 
JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    &lt;p&gt;Google's new voice messaging</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2455,16 +1967,21 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you circulate</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who is
+    in</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>pictures are 
likely</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>Conditions&rdquo; that spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    &lt;p&gt;If so, none of Facebook users' pictures</em></ins></span> are 
<span class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should 
clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>private anymore,
+    even if</em></ins></span> the <span 
class="removed"><del><strong>information</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -2472,8 +1989,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
+    snoop on what people are listening to or watching&lt;/a&gt;. In 
addition,</em></ins></span>
+    it <span class="removed"><del><strong>collects</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's conversations to serve them 
with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2482,7 +1999,9 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
+    spy</em></ins></span> on <span class="removed"><del><strong>users, 
instead</strong></del></span> <span class="inserted"><ins><em>many 
sorts</em></ins></span> of <span class="removed"><del><strong>hiding 
it</strong></del></span> <span class="inserted"><ins><em>data</em></ins></span> 
in <span class="removed"><del><strong>an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>the phone, and in 
server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2493,47 +2012,65 @@
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    such as Facebook, Google+</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in the first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated to the app's functionality, was</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
+    to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
+    legitimate, but</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>that valid? 
Software developers have no right</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when it's actually</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users are</em></ins></span> 
doing <span class="removed"><del><strong>something else.  Such a thing would be 
almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510300"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and location information&lt;/a&gt; of their users to
+    &lt;p&gt;More</em></ins></span> than 73% <span 
class="inserted"><ins><em>and 47%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android 
<span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over</em></ins></span>
+    personal, behavioral and location information&lt;/a&gt; of their users 
<span class="removed"><del><strong>with</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span>
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that it is nasty.&lt;/p&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
+    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows the &lt;a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
     typical example of the attitude of the proprietary software industry
@@ -2547,51 +2084,75 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
-    Android apps contained recognizable tracking libraries. For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;
+    A study</em></ins></span> in <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of</em></ins></span> 
the <span class="removed"><del><strong>500 most popular</strong></del></span> 
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span 
class="inserted"><ins><em>proprietary</em></ins></span>
+    Android <span 
class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>apps contained recognizable tracking libraries. 
For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these</strong></del></span> <span 
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
+  <span 
class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of 
them</em></ins></span> are not <span class="removed"><del><strong>free 
software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>granted</strong></del></span> that <span 
class="removed"><del><strong>the usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
+    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201505060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
+    &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
     and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201504060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This</em></ins></span> 
is <span class="removed"><del><strong>present</strong></del></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
     the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;
+    get users</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>say &ldquo;I agree&rdquo;. That is no excuse 
for
+    malware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201411260"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. 
Not</em></ins></span>
+    as <span class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>bad as 
what</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-  &lt;li id="M201401150.1"&gt;
+&lt;!-- #SpywareOnMobiles</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
@@ -2601,37 +2162,95 @@
 
   &lt;li id="M201312270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The nonfree Snapchat app's 
principal purpose is</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>restrict the
+    use of data</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span 
class="inserted"><ins><em>does surveillance too:</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries</em></ins></span> to <span class="removed"><del><strong>study how 
iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
+      obvious way</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app would not.&lt;/p&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation,</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to</strong></del></span> use <span 
class="inserted"><ins><em>by companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>asked</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of</strong></del></span> <span class="inserted"><ins><em>user to
+    approve sending</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> app <span 
class="removed"><del><strong>on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>developer but did not ask
+    about sending it to other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>weakness 
of</em></ins></span>
+    the <span class="removed"><del><strong>server records these numbers for at 
least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span>
+    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a <span class="removed"><del><strong>valid email address and receiving the code 
Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>flashlight 
app send any information</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212100"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of 
the</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;FTC says</em></ins></span> most <span 
class="removed"><del><strong>popular iOS</strong></del></span> <span 
class="inserted"><ins><em>mobile</em></ins></span> apps <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2643,11 +2262,22 @@
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>say 
whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
+    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly</em></ins></span> means
+      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> it <span class="removed"><del><strong>still counts as 
a</strong></del></span> <span class="inserted"><ins><em>can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2671,17 +2301,26 @@
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft is imposing its
-    surveillance on the game of Minecraft by &lt;a
-    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    &lt;p&gt;Microsoft is imposing its</em></ins></span>
+    surveillance <span class="removed"><del><strong>functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>on the game</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
     has bought the game and will merge all accounts into its network,
-    which will give them access to people's data.&lt;/p&gt;
+    which will give</em></ins></span> them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>access to people's data.&lt;/p&gt;
 
-    &lt;p&gt;Minecraft players &lt;a
-    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects the user's computer freedom. As a bonus,
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2690,40 +2329,74 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>iThing is,</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
+    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201806240"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span>
+    is <span class="removed"><del><strong>still true</strong></del></span> 
<span class="inserted"><ins><em>found</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks</em></ins></span> data <span class="removed"><del><strong>from 
iPhones for the state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804144"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to</em></ins></span> snoop on all <span class="removed"><del><strong>the 
data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711070"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201512290"&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
@@ -2731,27 +2404,46 @@
     video game consoles snoop on their users and report to the
     internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console is a computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>a computer,</em></ins></span> and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow</strong></del></span> <span class="inserted"><ins><em>you can't 
trust</em></ins></span> a <span class="removed"><del><strong>user's movements 
around</strong></del></span> <span class="inserted"><ins><em>computer 
with</em></ins></span>
+    a <span class="removed"><del><strong>physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree operating system.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
 
-  &lt;li id="M201509160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range</em></ins></span> of data <span 
class="inserted"><ins><em>about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,
+      &lt;a 
href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span> 
<span class="inserted"><ins><em>buy things, and hunt for
+    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>be led</em></ins></span> to <span 
class="removed"><del><strong>turn the phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>spend a lot of money. They also
+    use a back door</em></ins></span> to <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>game play for 
specific players.&lt;/p&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost money
+    &lt;p&gt;While</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2760,9 +2452,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
+    to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come with</strong></del></span> <span 
class="inserted"><ins><em>spy through it too&lt;/a&gt;.  Here's information 
on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -2774,13 +2470,22 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>they send so much data that their 
transmission is</strong></del></span> <span 
class="inserted"><ins><em>sniffs</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested by the user, clearly must constitute 
spying</strong></del></span>
+    <span class="inserted"><ins><em>good deal</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data&lt;/a&gt;, including lots of activities 
which
+    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -2794,42 +2499,66 @@
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    &lt;p&gt;Most Internet connected devices</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span> <span 
class="inserted"><ins><em>Mozilla's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of the program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the user susceptible to be snooped and exploited by crackers as
+    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
+before <span class="inserted"><ins><em>Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202010282"&gt;
@@ -2841,57 +2570,92 @@
     hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It appears that those manufacturers business model is not to 
produce
-    TV and sell them for money, but to collect your personal data and
-    (possibly) hand over them to others for benefit.&lt;/p&gt;
+    TV</em></ins></span> and <span class="removed"><del><strong>after 
going</strong></del></span> <span class="inserted"><ins><em>sell them for 
money, but to collect your personal data and
+    (possibly) hand over them</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>others 
for benefit.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202006250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
-    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    &lt;p&gt;TV manufacturers are able to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
+    every <span 
class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>second of what the user is watching&lt;/a&gt;. 
This is illegal due to
     the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;
+    it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201901070"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
     collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
+    CTO,</em></ins></span> and <span class="removed"><del><strong>email 
addresses&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
data is sold to third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>user's address
+      book</strong></del></span> <span class="inserted"><ins><em>return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note 
that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>spying 
acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>him,
     is that it is opt-in in newer models. But since the Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
+    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
+    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
+    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may
+    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
+    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
+
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
     be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+    firewall</em></ins></span> to <span class="removed"><del><strong>do lots 
of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>block connections</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article for the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
+    is too bad</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> the <span 
class="inserted"><ins><em>article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app <span class="removed"><del><strong>is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2900,22 +2664,39 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span> 
and
+    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>image is coming 
from</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
+    the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>way to 
disable the
+    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data</strong></del></span> <span 
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span 
class="inserted"><ins><em>these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
+    &lt;p&gt;Some web</em></ins></span> and <span class="inserted"><ins><em>TV 
advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers</em></ins></span> can
+  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2925,8 +2706,8 @@
     &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track you
     across devices.&lt;/p&gt;
 
     &lt;p&gt;It is possible to turn this off, but having it enabled by default
@@ -2937,29 +2718,40 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops</em></ins></span> on what <span class="removed"><del><strong>radio 
and TV</strong></del></span> programs 
+      <span class="removed"><del><strong>are playing nearby&lt;/a&gt;.  
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and 
even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2968,20 +2760,31 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on what
+    users <span class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201502090"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or some
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not</em></ins></span> to be
+      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
@@ -2995,7 +2798,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    snooping all</em></ins></span> the <span class="removed"><del><strong>wire 
to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
@@ -3005,34 +2811,57 @@
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report 
which</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on</em></ins></span> other
+    <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+    product could spy</em></ins></span> this <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -3044,10 +2873,18 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found</em></ins></span> a way <span 
class="removed"><del><strong>that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>use its camera to 
watch</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3059,39 +2896,52 @@
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone 
that comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+    at</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
+      users</strong></del></span>
+    <span class="inserted"><ins><em>video&mdash;Amazon expects 
society</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surrender to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>videos. That's</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
+    <span class="inserted"><ins><em>security for your home. Security means 
making sure they don't get</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3103,18 +2953,25 @@
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -3127,15 +2984,28 @@
 
   &lt;li id="M201711100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers to listen in on a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
@@ -3165,35 +3035,145 @@
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+      misunderstanding.  However, it is certainly surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;CloudPets&rdquo; toys with 
microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
     Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
     company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-  &lt;li id="M201502180"&gt;
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 <span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
@@ -3272,27 +3252,26 @@
 
     &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable 
exposure</em></ins></span>
-    to <span class="inserted"><ins><em>contagious disease that can be fatal.  
Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>almost 
anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had</em></ins></span>
-    a <span class="removed"><del><strong>server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> <span class="inserted"><ins><em>security 
vulnerability that enabled attackers to &lt;a
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    access</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant surveillance if the devices implemented proper
-    security, including encryption. But many devices with</em></ins></span> 
proprietary <span class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it</strong></del></span>
-    <span class="inserted"><ins><em>software lack this. Of course, they 
are</em></ins></span> also <span class="removed"><del><strong>demonstrates that 
the device gives the company
-      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used by their
+    out any significant</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
     manufacturers for snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
@@ -3359,86 +3338,85 @@
   &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem</strong></del></span> 
<span class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers,</em></ins></span> which <span 
class="removed"><del><strong>allows
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>store it 
indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>government agencies. In other words,
-    deleting the collected information doesn't cancel</em></ins></span> the 
<span class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>wrong of
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers, 
which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>system has no authentication 
when</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be</em></ins></span> accessed <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span 
class="removed"><del><strong>car is
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the 
servers</em></ins></span>
+    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
+    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are 
tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
+    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
     proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span> 
the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>phone company</strong></del></span> 
<span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>past (and, who 
knows,
-    in</em></ins></span> the <span class="removed"><del><strong>cell phone 
modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
+    in</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201904240"&gt;
+  &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>listen 
to&lt;/a&gt;. The Google</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>Apple
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>the Alexa 
service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program</em></ins></span> is <span 
class="removed"><del><strong>not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>saying &ldquo;We won't
-    tell you how</em></ins></span> and <span 
class="removed"><del><strong>should be replaced</strong></del></span> <span 
class="inserted"><ins><em>where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates</em></ins></span> with <span 
class="removed"><del><strong>anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>HP servers&lt;/a&gt; to make sure</em></ins></span> 
the <span class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>user is still
-    paying for the subscription, and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    paid for.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3527,26 +3505,17 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal</em></ins></span> 
that <span class="removed"><del><strong>is viewed on 
them,</strong></del></span> <span class="inserted"><ins><em>companies
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3560,57 +3529,61 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. They &lt;a
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    permit security breakers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and 
<span class="removed"><del><strong>cable&lt;/a&gt;. Even if the image is 
coming</strong></del></span> from the <span class="removed"><del><strong>user's 
own
-    computer, the TV reports what it is. The existence of a way to
-    disable</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to and 
from</em></ins></span> the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>watch, possibly 
endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses</em></ins></span> 
the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
+  &lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span>
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    that <span class="inserted"><ins><em>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>back door, but</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span 
class="inserted"><ins><em>could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence 
of</strong></del></span> a <span class="removed"><del><strong>way to
+    disable the surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>back door, but that 
could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407090"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less 
all</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to report <span class="removed"><del><strong>what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its location to someone else and to transmit 
conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to</em></ins></span> report <span class="removed"><del><strong>was as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>its location</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>someone else and</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3622,24 +3595,27 @@
   &lt;li id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Toyotas will</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &lt;p&gt;New Toyotas</em></ins></span> will
+      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    upload data</em></ins></span> to <span class="removed"><del><strong>report 
what
+      the user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>AWS to help create 
custom insurance premiums&lt;/a&gt;
+    based</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
       &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
-    based on driver behaviour.&lt;/p&gt;
+      link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span class="inserted"><ins><em>driver 
behaviour.&lt;/p&gt;
 
     &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can <span 
class="removed"><del><strong>track</strong></del></span>
     <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If</em></ins></span> you 
       <span class="removed"><del><strong>across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>want
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>want
     GPS navigation, get a separate navigator which runs free software
-    and works</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>Open Street Map.&lt;/p&gt;
+    and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
@@ -3647,54 +3623,59 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
-    the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>user, 
access</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden</em></ins></span> and 
<span class="removed"><del><strong>TV advertisements play inaudible sounds to be
-      picked up by proprietary malware</strong></del></span> running <span 
class="removed"><del><strong>on other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> with <span 
class="removed"><del><strong>Web activity,</strong></del></span>
+    record and send various kinds of data</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as</em></ins></span> it 
<span class="removed"><del><strong>enabled by default</strong></del></span> 
<span class="inserted"><ins><em>involves
+    cracking the car's computer, which</em></ins></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running</em></ins></span> with 
<span class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span>
     <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
-      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+  &lt;li id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,</strong></del></span>
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the ignition
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity by disconnecting the cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
+    antenna</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
     to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
@@ -3702,11 +3683,12 @@
       snooping all</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+  &lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
@@ -3758,22 +3740,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201607160"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;!-- #SpywareInGames</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 <span class="removed"><del><strong>&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
@@ -3785,7 +3759,15 @@
 
   &lt;li&gt;
     &lt;p&gt;The driver for</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p id="nissan-modem"&gt;The Nissan Leaf 
has</em></ins></span> a <span class="removed"><del><strong>certain gaming 
keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span> <span class="inserted"><ins><em>built-in
+    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span> <span class="inserted"><ins><em>built-in
     cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3840,8 +3822,8 @@
 
       &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>to 
get</em></ins></span> the data
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
       <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
     over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
@@ -3904,15 +3886,16 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates</em></ins></span> the <span class="removed"><del><strong>app said 
that users gave consent</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>this,
-      would that make</strong></del></span> <span 
class="inserted"><ins><em>the most intimate
-    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>takes to make this 
potential real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal to design</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+      would that make it acceptable? No way! It should be flat out
+      &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+       illegal to design</strong></del></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>most intimate
+    surveillance ever. All it takes</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make this 
potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>maximum 
possible
+    &lt;p&gt;You can bet Facebook will implement the maximum possible
     surveillance on Oculus Rift devices. The moral is, never trust a VR
     system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -4043,20 +4026,22 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows</strong></del></span>
+      Microsoft SkyDrive allows the NSA</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
-    that don't have Facebook accounts.&lt;/p&gt;
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track visitors to those pages&lt;/a&gt;&mdash;even 
users
+    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
+
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -4066,28 +4051,25 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>information that users have typed into a
     form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>same sort of
-    malware</em></ins></span> to <span class="removed"><del><strong>directly 
examine users' data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
+  &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>give other companies personal data</em></ins></span> 
on <span class="removed"><del><strong>top under each 
subsection</strong></del></span>
-    <span class="inserted"><ins><em>its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
@@ -4163,11 +4145,9 @@
     users' computers and report the sites they visit</em></ins></span> to 
<span class="removed"><del><strong>snoop on information 
that</strong></del></span> <span class="inserted"><ins><em>advertising and
     data companies, first of all to Google. Moreover, if</em></ins></span> 
users have <span class="removed"><del><strong>typed into</strong></del></span> 
a <span class="removed"><del><strong>form but not
     sent&lt;/a&gt;,</strong></del></span>
-    <span class="inserted"><ins><em>Gmail account, Chrome automatically logs 
them</em></ins></span> in <span 
class="removed"><del><strong>order</strong></del></span> to <span 
class="removed"><del><strong>learn their identity. Some are &lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the browser for
-    more convenient profiling. On Android, Chrome also reports their
-    location to Google.&lt;/p&gt;
+    <span class="inserted"><ins><em>Gmail account, Chrome automatically logs 
them</em></ins></span> in <span 
class="removed"><del><strong>order</strong></del></span> to <span 
class="removed"><del><strong>learn</strong></del></span> <span 
class="inserted"><ins><em>the browser for
+    more convenient profiling. On Android, Chrome also 
reports</em></ins></span> their <span class="removed"><del><strong>identity. 
Some</strong></del></span>
+    <span class="inserted"><ins><em>location to Google.&lt;/p&gt;
 
     &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
     href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
@@ -4177,8 +4157,10 @@
   &lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
-    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools</em></ins></span> are &lt;a
+    <span 
class="removed"><del><strong>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
     it indefinitely&lt;/a&gt;. Parents and students complain about the lack
     of transparency on the part of both the educational services and the
@@ -4189,36 +4171,37 @@
     should realize that the software Google uses to spy on students is
     nonfree, so they can't verify what it really does. The only remedy is
     to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt; for both education and school
+    exclusively use free software&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>both education and school
     administration. If the school is run locally, parents and teachers
     can mandate their representatives at the School Board to refuse the
     budget unless the school initiates a switch to free software. If
     education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
-    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash 
Player's</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
+  &lt;li id="M201507280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome makes it easy for an extension to 
do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for</strong></del></span> 
<span class="inserted"><ins><em>many of them do so.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash 
Player's</strong></del></span>
 
-  &lt;li id="M201506180"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span>
+    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    activates microphones</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -4274,21 +4257,32 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;While you're using</strong></del></span>
+    &lt;p&gt;While you're using a DJI drone</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists</em></ins></span> to 
<span class="removed"><del><strong>snoop on other people, 
DJI</strong></del></span> <span class="inserted"><ins><em>Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202012250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The HonorLock online exam
-    proctoring program is</em></ins></span> a <span 
class="removed"><del><strong>DJI drone to snoop</strong></del></span> <span 
class="inserted"><ins><em>surveillance tool that &lt;a
+    proctoring program</em></ins></span> is <span class="inserted"><ins><em>a 
surveillance tool that &lt;a
     
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
     students and collects data&lt;/a&gt; such as face, driving license, and
     network information, among others, in blatant violation of students'
     privacy.&lt;/p&gt;
 
     &lt;p&gt;Preventing students from cheating should not be an excuse for
-    running malware/spyware</em></ins></span> on <span 
class="removed"><del><strong>other people, DJI is</strong></del></span> <span 
class="inserted"><ins><em>their computers, and it's good that students
+    running malware/spyware on their computers, and it's good that students
     are protesting. But their petitions overlook a crucial issue, namely,
     the injustice of being forced to run nonfree software</em></ins></span> in 
<span class="inserted"><ins><em>order to
     get an education.&lt;/p&gt;
@@ -4464,7 +4458,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/16 17:33:27 $
+$Date: 2021/04/11 13:04:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.386
retrieving revision 1.387
diff -u -b -r1.386 -r1.387
--- proprietary-surveillance.de.po      16 Mar 2021 17:33:27 -0000      1.386
+++ proprietary-surveillance.de.po      11 Apr 2021 13:04:33 -0000      1.387
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5812,6 +5812,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 "href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
 "against-proctoring-surveillance-apps\">tracks students and collects data</a> "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary-surveillance.es.po      17 Mar 2021 10:32:16 -0000      1.176
+++ proprietary-surveillance.es.po      11 Apr 2021 13:04:33 -0000      1.177
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2021-03-17 11:07+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -5287,6 +5288,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 "href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
 "against-proctoring-surveillance-apps\">tracks students and collects data</a> "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.620
retrieving revision 1.621
diff -u -b -r1.620 -r1.621
--- proprietary-surveillance.fr.po      16 Mar 2021 21:58:41 -0000      1.620
+++ proprietary-surveillance.fr.po      11 Apr 2021 13:04:34 -0000      1.621
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2021-03-16 22:58+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -5304,6 +5305,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 "href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
 "against-proctoring-surveillance-apps\">tracks students and collects data</a> "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary-surveillance.it-diff.html       16 Mar 2021 17:33:27 -0000      
1.242
+++ proprietary-surveillance.it-diff.html       11 Apr 2021 13:04:34 -0000      
1.243
@@ -630,11 +630,10 @@
   &lt;li id="M201509220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>specific
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
     href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
@@ -658,44 +657,35 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202102200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps</strong></del></span> <span 
class="inserted"><ins><em>proprietary program Clubhouse
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The proprietary program Clubhouse
     is malware and a privacy disaster. Clubhouse &lt;a
     
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
-    people's personal data such</em></ins></span> as <span 
class="removed"><del><strong>&ldquo;free&rdquo;,
-  but most</strong></del></span> <span 
class="inserted"><ins><em>recordings</em></ins></span> of <span 
class="removed"><del><strong>them are</strong></del></span> <span 
class="inserted"><ins><em>people's
-    conversations&lt;/a&gt;, and, as a secondary problem, 
does</em></ins></span> not <span class="inserted"><ins><em>encrypt them,
+    people's personal data such as recordings of people's
+    conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
     which shows a bad security part of the issue.&lt;/p&gt;
 
-    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted</em></ins></span>
-    in <span class="removed"><del><strong>fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>plaintext, and Agora (the company 
behind</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A</strong></del></span> <span 
class="inserted"><ins><em>app) would likely
+    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
+    in plaintext, and Agora (the company behind the app) would likely
     have access to users' raw audio, potentially providing access to
     the Chinese government.&lt;/p&gt;
 
-    &lt;p&gt;Even with</em></ins></span> good <span 
class="removed"><del><strong>replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>security 
of data transmission, collecting personal
-    data of people</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wrong and a violation of people's privacy 
rights.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even with good security of data transmission, collecting personal
+    data of people is wrong and a violation of people's privacy 
rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202101080"&gt;
+  &lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
+    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
     its users to hand over sensitive personal data&lt;/a&gt; to its parent
     company. This increases Facebook's power over users, and further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
     &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which 
is</em></ins></span>
-    free software <span 
class="removed"><del><strong>apps,</strong></del></span> <span 
class="inserted"><ins><em>and will not collect your data.&lt;/p&gt;
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
+    free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006260"&gt;
@@ -704,11 +694,10 @@
     &lt;p&gt;Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is &lt;a
     
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>as well
+    especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>Biden's 
app has a less manipulative overall
+    &lt;p&gt;The article says that Biden's app has a less manipulative overall
     approach, but that does not tell us whether it has functionalities we
     consider malicious, such as sending data the user has not explicitly
     asked to send.&lt;/p&gt;
@@ -1690,7 +1679,7 @@
   &lt;li id="M201711240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tracking software in popular Android apps
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
@@ -1759,7 +1748,7 @@
   &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    &lt;p&gt;A study</em></ins></span> found <span 
class="inserted"><ins><em>234 Android apps</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
@@ -1768,9 +1757,10 @@
   &lt;li id="M201704260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do lots</em></ins></span> of <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -1792,7 +1782,8 @@
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs of Android apps can collude
+    &lt;p&gt;Pairs of</em></ins></span> Android apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid</strong></del></span> <span class="inserted"><ins><em>can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
@@ -1803,14 +1794,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    announced an opt-in</em></ins></span> proprietary <span 
class="removed"><del><strong>apps,</strong></del></span> <span 
class="inserted"><ins><em>search app that</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install
     on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    being pre-installed on</em></ins></span> only <span 
class="removed"><del><strong>60%.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -1826,29 +1817,48 @@
 
   &lt;li id="M201611280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact</strong></del></span> <span 
class="inserted"><ins><em>Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>that word</strong></del></span> <span 
class="inserted"><ins><em>surveillance</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A &lt;a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and security of
-    283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234</strong></del></span> <span 
class="inserted"><ins><em>investigated the privacy and security of
+    283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="inserted"><ins><em>concluded</em></ins></span> that <span 
class="removed"><del><strong>track users</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite of the promises
+    for privacy, security, and anonymity given</em></ins></span> by
+       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the majority of VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span> <span class="inserted"><ins><em>poor security
+    guarantees and abusive practices inflicted</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>VPN 
apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research 
paper,</em></ins></span>
+    of <span class="removed"><del><strong>Android</strong></del></span> <span 
class="inserted"><ins><em>some proprietary VPN</em></ins></span> apps <span 
class="removed"><del><strong>can collude</strong></del></span> <span 
class="inserted"><ins><em>that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
@@ -1858,11 +1868,13 @@
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
-      text messages.&lt;/dd&gt;
+      permissions upon installation, meaning it has full 
access</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> users' <span 
class="removed"><del><strong>personal
+       data</strong></del></span>
+      <span class="inserted"><ins><em>text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span> <span class="inserted"><ins><em>read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
@@ -1872,19 +1884,22 @@
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
+      users. The stated purpose</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>the JS injection is to display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
+      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>the non-premium version of the app does 
JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
@@ -1895,19 +1910,41 @@
   &lt;li id="M201606050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    &lt;p&gt;Facebook's new Magic Photo</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you circulate</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>require 
online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>pictures</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>likely to be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
+    even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
+    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -1916,33 +1953,39 @@
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    it may</em></ins></span> be <span class="removed"><del><strong>almost
+    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>analyzing people's conversations to serve 
them</em></ins></span> with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201604250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
+    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps that include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>TV programs
+    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>post 
on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    &lt;p&gt;&ldquo;Cryptic</em></ins></span> communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
@@ -1956,41 +1999,55 @@
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201510300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and location information&lt;/a&gt; of their users to
-    third parties.&lt;/p&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, 
for</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span> <span class="inserted"><ins><em>and 
iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt; of their users to
+    third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201508210"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>present 
in</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that it is nasty.&lt;/p&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, 
and</em></ins></span> some <span class="removed"><del><strong>Android devices 
when they</strong></del></span> are <span class="removed"><del><strong>sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>starting</em></ins></span>
+    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This article shows the &lt;a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This 
is</em></ins></span> a
+      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>typical example of the attitude of the 
proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506264"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
+    A study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
     Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
@@ -1998,71 +2055,173 @@
     &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-  &lt;li id="M201505060"&gt;
+&lt;!-- #SpywareOnMobiles</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Widely used &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
-    the phone.&lt;/p&gt;
+    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the user&lt;/a&gt;. This is</em></ins></span> in 
<span class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span>
+    the <span class="removed"><del><strong>phone is</strong></del></span> 
snooping <span class="removed"><del><strong>on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every</strong></del></span> <span 
class="inserted"><ins><em>done by the</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>OS 
in</em></ins></span>
+    the <span class="removed"><del><strong>server records these numbers for at 
least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by</em></ins></span> the <span 
class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>question</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>app developers
+    get</em></ins></span> users <span class="removed"><del><strong>with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>say &ldquo;I 
agree&rdquo;. That</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> proprietary <span 
class="removed"><del><strong>apps, one</strong></del></span> <span 
class="inserted"><ins><em>apps for mobile devices
-    report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other apps</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
+    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
+    is <span class="inserted"><ins><em>doing this in</em></ins></span> a way 
<span class="removed"><del><strong>to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>that at least is 
visible and optional&lt;/a&gt;. Not
+    as bad</em></ins></span> as <span class="inserted"><ins><em>what the 
others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    &lt;p&gt;The Simeji keyboard is</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span> <span class="inserted"><ins><em>restrict the
+    use</em></ins></span> of <span class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>data on</em></ins></span> the <span 
class="inserted"><ins><em>user's computer, but it does surveillance 
too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
+      and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to</em></ins></span> get <span class="inserted"><ins><em>the 
user's list of</em></ins></span> other <span class="removed"><del><strong>info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people's 
phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because</em></ins></span> it
+      <span class="removed"><del><strong>is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>asked</em></ins></span> the <span 
class="inserted"><ins><em>user to
+    approve sending personal</em></ins></span> data <span 
class="removed"><del><strong>in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>to the app 
developer but did not ask
+    about sending</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to 
<span class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
+    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
@@ -2070,47 +2229,43 @@
   &lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to say whether it</em></ins></span> can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do 
so.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That almost certainly means it</em></ins></span> can <span 
class="removed"><del><strong>take over 
smartphones&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>do 
so.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
+  &lt;li id="M201307110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2123,76 +2278,57 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft is imposing its
-    surveillance on the game</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude</strong></del></span> 
<span class="inserted"><ins><em>Minecraft by &lt;a
+    surveillance on the game of Minecraft</em></ins></span> by <span 
class="removed"><del><strong>sending hidden text messages</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player</em></ins></span> to <span 
class="removed"><del><strong>transmit users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>open an 
account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its network,
-    which will give them access</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
-
-    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
-    instead. The essential advantage</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>Minetest is</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>it is free
-    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>personal details of</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its 
network,</em></ins></span>
+    which <span class="removed"><del><strong>enable</strong></del></span> 
<span class="inserted"><ins><em>will give</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded</em></ins></span> users <span 
class="removed"><del><strong>that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> of 
<span class="removed"><del><strong>users is not enough</strong></del></span> 
<span class="inserted"><ins><em>Xboxes and had &lt;a
+    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers</em></ins></span> listen to the <span 
class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span 
class="removed"><del><strong>Conditions&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell is a spyware</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects</strong></del></span>
-    <span class="inserted"><ins><em>is found in many proprietary games. It 
&lt;a
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data</em></ins></span> on <span class="removed"><del><strong>users, 
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>users' 
computers and sends</em></ins></span> it <span class="removed"><del><strong>in 
an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
-and other companies from getting this personal information 
in</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> data <span class="removed"><del><strong>from the
+      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>on users' 
computers</em></ins></span> and <span class="removed"><del><strong>web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sends it to third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>massive
+    program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
+  &lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
     information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2201,71 +2337,51 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span>
+    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
     <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is
-    <span class="removed"><del><strong>yet another example of nonfree software 
pretending to obey the user,
-    when it's actually doing something else.  Such</strong></del></span> a 
<span class="removed"><del><strong>thing would be almost
-    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>computer, and you can't trust a 
computer</em></ins></span> with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>a nonfree operating 
system.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
+    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
+  &lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt;</strong></del></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range</em></ins></span> of <span 
class="inserted"><ins><em>data about</em></ins></span> their users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>and their 
users'
+    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>data
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is</strong></del></span> 
<span class="inserted"><ins><em>merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a
+      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>lot of money. 
They also
+    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
+
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>manipulate people to buy things, and 
hunt</em></ins></span> for <span class="removed"><del><strong>granted that the 
usual analytics tools are
-  legitimate, but is that valid?  Software developers have no 
right</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;whales&rdquo; who can be 
led</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
-
-    &lt;p&gt;While the article describes gratis games, games</em></ins></span> 
that <span class="removed"><del><strong>snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cost money
-    can use the same tactics.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
+  &lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
-    to <span class="inserted"><ins><em>spy through it too&lt;/a&gt;.  Here's 
information on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> <span class="inserted"><ins><em>companies, 
and</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -2273,116 +2389,88 @@
     More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers 
add</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is</em></ins></span> a
-      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;</strong></del></span>
 hidden <span class="removed"><del><strong>general surveillance package such as 
Carrier IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;cheating-prevention&rdquo; program 
that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on <span class="removed"><del><strong>the 
system.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
process running on a gamer's computer and sniffs a
+    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
-
-
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareOnMobiles"&gt;Spyware 
on Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-
-<span class="removed"><del><strong>&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings</strong></del></span> <span 
class="inserted"><ins><em>Mozilla's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
-    Not Included&rdquo;&lt;/a&gt; list</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> <span 
class="inserted"><ins><em>snoop on users&lt;/a&gt;</em></ins></span> even <span 
class="removed"><del><strong>gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>if they meet
+    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
+    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    Not Included&rdquo;&lt;/a&gt; list &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
+    designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design</em></ins></span> of the <span class="removed"><del><strong>most 
popular iOS apps</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the user susceptible to be snooped</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
+    well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+  &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>Apple's 
servers</strong></del></span> <span class="inserted"><ins><em>snoop on the 
people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all the <span 
class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman 
came</em></ins></span> up to <span class="removed"><del><strong>date on all 
your devices.
-      Any edits</strong></del></span> <span class="inserted"><ins><em>me and
-said, &ldquo;Didn't I see</em></ins></span> you <span 
class="removed"><del><strong>make</strong></del></span> <span 
class="inserted"><ins><em>on television?&rdquo; I said, &ldquo;I
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
@@ -2390,578 +2478,474 @@
   &lt;li id="M202010282"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    &lt;p&gt;TV manufacturers are turning to produce only
+    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
+    href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
+    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;(From</strong></del></span> <span 
class="inserted"><ins><em>turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware) that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's
 now very
-    hard to find a TV that doesn't spy</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It appears that those manufacturers business 
model</em></ins></span> is <span class="removed"><del><strong>a 
way</strong></del></span> <span class="inserted"><ins><em>not</em></ins></span> 
to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>produce
-    TV and sell them for money,</em></ins></span> but <span 
class="removed"><del><strong>it's active by default so it still counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>to collect your 
personal data and
+    &lt;p&gt;It</em></ins></span> appears <span class="inserted"><ins><em>that 
those manufacturers business model is not to produce
+    TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging 
by</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>what the 
user is watching&lt;/a&gt;. This is illegal due</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span>
-    <span class="inserted"><ins><em>the Video Privacy Protection 
Act</em></ins></span> of <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>1988, but they're circumventing
-    it</em></ins></span> through <span 
class="inserted"><ins><em>EULAs.&lt;/p&gt;
+    every second of what the user is watching&lt;/a&gt;. This is illegal 
due</em></ins></span> to <span class="removed"><del><strong>personal data 
in</strong></del></span>
+    the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Video Privacy Protection Act of 1988, but they're 
circumventing
+    it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201901070"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt;</em></ins></span> in 
<span class="removed"><del><strong>iThings:</strong></del></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>own words 
of</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>company's
-    CTO,</em></ins></span> and <span class="removed"><del><strong>get other 
info too.&lt;/p&gt;
-  &lt;/li&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>this data</em></ins></span> is <span 
class="removed"><del><strong>also a feature</strong></del></span> <span 
class="inserted"><ins><em>sold to third parties. This is in 
return</em></ins></span> for <span class="removed"><del><strong>web 
sites</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>own words of</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>company's
+    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>the
+    user must explicitly</strong></del></span> <span 
class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>track users, which</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, according to 
him,</em></ins></span>
-    is
-      <span class="removed"><del><strong>&lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> it is <span 
class="removed"><del><strong>still true</strong></del></span> <span 
class="inserted"><ins><em>opt-in</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>NSA snoop on</strong></del></span> <span 
class="inserted"><ins><em>scenes,
-    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV,</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>that
-    matter),</em></ins></span> the
-      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>easiest way</em></ins></span> to <span 
class="removed"><del><strong>turn the phones</strong></del></span> <span 
class="inserted"><ins><em>make sure it isn't spying</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>you is</em></ins></span>
-    to <span class="removed"><del><strong>the microphone, retrieve 
geo-location data</strong></del></span> <span 
class="inserted"><ins><em>disconnect it</em></ins></span> from the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>Internet,</em></ins></span> and <span 
class="removed"><del><strong>read the contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>use a terrestrial 
antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented,</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is that it is</em></ins></span> opt-in <span 
class="removed"><del><strong>before</strong></del></span> <span 
class="inserted"><ins><em>in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>Vizio software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure it isn't spying on 
you</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    to <span class="inserted"><ins><em>disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>terrestrial 
antenna
+    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>only</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV</em></ins></span> with <span 
class="inserted"><ins><em>another model.&lt;/p&gt;
+    you</em></ins></span> can <span class="inserted"><ins><em>replace your TV 
with another model.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>their transmission is</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> a
-      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>surveillance 
app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested</strong></del></span> <span class="inserted"><ins><em>the 
facts it presents. It
-    is too bad that the article finishes</em></ins></span> by <span 
class="inserted"><ins><em>advocating</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>article for the 
facts</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app <span class="removed"><del><strong>tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
+  &lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming</em></ins></span> from <span 
class="removed"><del><strong>us by a paywall)</strong></del></span> <span 
class="inserted"><ins><em>the user's own computer,
-    the TV</em></ins></span> reports <span class="removed"><del><strong>that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 <span class="inserted"><ins><em>what it is. The existence of a way to 
disable</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+    report everything that is viewed on them,</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
+        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
+    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511130"&gt;
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web</em></ins></span> and <span 
class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices</em></ins></span> in <span 
class="removed"><del><strong>Android
-      phones</strong></del></span> <span class="inserted"><ins><em>range so as 
to determine that they
+    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
+    sounds to be picked up by proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>their users: 
their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
+    manufacturers in spying on their users: their</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
-    across devices.&lt;/p&gt;
+    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
+    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>restrict
-      the use of data on the user's computer,</strong></del></span> <span 
class="inserted"><ins><em>turn this off,</em></ins></span> but <span 
class="inserted"><ins><em>having</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across the wire</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+  &lt;li id="M201511020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
+    to <span class="removed"><del><strong>Facebook's servers and 
face-recognition
+      algorithms.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span>
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>do lots of surveillance, 
judging</strong></del></span> <span class="inserted"><ins><em>the 600 millions 
social media profiles the company
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
-    being watched</em></ins></span> by <span 
class="inserted"><ins><em>advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span class="removed"><del><strong>personal 
data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by 
default.&lt;/p&gt;</em></ins></span>
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
+    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+  &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app is</strong></del></span> <span 
class="inserted"><ins><em>isn't a TV channel.&lt;/p&gt;
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps the user has
+    installed.</strong></del></span>
 
-  &lt;li id="M201505290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>only one 
phone&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>the
-    user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
+    snoops on what programs people watch,</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
     record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>firmware 
&ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did</em></ins></span> not <span 
class="removed"><del><strong>only
-  can</strong></del></span> <span class="inserted"><ins><em>do that when first 
sold.&lt;/p&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
+    used <span class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to make its 
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice</em></ins></span> on <span 
class="removed"><del><strong>many sorts of data in</strong></del></span> the 
<span class="removed"><del><strong>phone, and in server accounts, 
it</strong></del></span> <span class="inserted"><ins><em>internet to another 
company, Nuance&lt;/a&gt;.
-    Nuance</em></ins></span> can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span> <span 
class="inserted"><ins><em>save it</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>would then 
have to give it to</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> 
<span class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not to be trusted unless it is done by free
-    software in your own computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to
+      <span class="removed"><del><strong>the snooping</strong></del></span> 
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done 
by <span class="removed"><del><strong>the phone company, and perhaps by the 
OS</strong></del></span> <span class="inserted"><ins><em>free
+    software</em></ins></span> in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data containing sensitive information will</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get
+      users</strong></del></span> <span 
class="inserted"><ins><em>transmitted</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>third
+    parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+  &lt;li id="M201411090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping</em></ins></span> all <span 
class="removed"><del><strong>conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</em></ins></span>
-    on <span class="removed"><del><strong>what radio and</strong></del></span> 
<span class="inserted"><ins><em>their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014, but we don't expect</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably 
the</em></ins></span> TV <span 
class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>will
-    say, &ldquo;Without your consent to tracking, the TV will not
-    work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also 
on</strong></del></span> <span class="inserted"><ins><em>not allowed to 
report</em></ins></span> what <span class="removed"><del><strong>users post on 
various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the
-    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to
+      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>get users' formal
+    consent before collecting</em></ins></span> personal data <span 
class="inserted"><ins><em>are totally inadequate.
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>TV will</em></ins></span> not
+      <span class="removed"><del><strong>ask about 
sending</strong></del></span>
+    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+  &lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> the 
<span class="removed"><del><strong>picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>who
-      is in</strong></del></span> <span class="inserted"><ins><em>turn this 
off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really</em></ins></span> means <span 
class="inserted"><ins><em>nothing;</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>server 
could save that data anyway.)&lt;/p&gt; 
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span> <span class="inserted"><ins><em>stop 
this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>Facebook 
users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    do lots</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li id="M201212170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
-    and <span class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>use its 
camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    send the video they capture</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>let 
individual employees look
-    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span>
-    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets</em></ins></span> the
-    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that</strong></del></span>
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything</em></ins></span> 
they <span class="removed"><del><strong>present snooping 
as</strong></del></span>
-    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>better
+    give</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example of
-      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
-    security for your home. Security means making sure</em></ins></span> they 
<span class="inserted"><ins><em>don't get to
-    see through your camera.&lt;/p&gt;
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see</em></ins></span> through <span class="removed"><del><strong>it 
too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance 
cameras</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps the user has
-    installed.</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
+  &lt;li id="M201511250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span> <span class="inserted"><ins><em>using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
-    optional&lt;/a&gt;. Not</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>a
-    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+    into <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+  &lt;li id="M201711100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="inserted"><ins><em>its 
users through</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in addition 
to</strong></del></span> <span class="inserted"><ins><em>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>temperature of</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps</strong></del></span> 
<span class="inserted"><ins><em>vibrator minute</em></ins></span> by <span 
class="removed"><del><strong>the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted</strong></del></span>
-    <span class="inserted"><ins><em>minute (thus, indirectly, whether it was 
surrounded</em></ins></span> by <span class="inserted"><ins><em>a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> the <span class="removed"><del><strong>app 
developers get</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response: a labeling
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>could have checked
+    products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued</em></ins></span> for <span class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collecting lots of personal information about how 
people
-    used it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because</strong></del></span> <span class="inserted"><ins><em>company's 
statement that</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal</strong></del></span> data <span 
class="removed"><del><strong>to the app developer</strong></del></span> <span 
class="inserted"><ins><em>may be
-    true,</em></ins></span> but <span class="removed"><del><strong>did not
-      ask about sending</strong></del></span> it <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>other companies.  
This shows</strong></del></span> <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the
-      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>pay</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
-    customers.&lt;/p&gt;</em></ins></span>
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer and <span class="removed"><del><strong>the 
FBI could listen to these conversations</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+  &lt;li id="M201612060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
@@ -2969,8 +2953,8 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
@@ -3027,31 +3011,97 @@
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
-    out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+    out prematurely and on accident and Google</em></ins></span> was <span 
class="removed"><del><strong>unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span 
class="inserted"><ins><em>planning</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>disclosing
+    this new feature</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>offering it</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>customers who 
pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;Bossware&rdquo; is malware 
that bosses</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy on them.&lt;/p&gt;
+    bosses can spy</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>user's &ldquo;consent&rdquo;</em></ins></span> 
is not <span class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span class="inserted"><ins><em>an adequate basis for protecting digital 
privacy.  The boss can coerce
+    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>almost anything, even probable exposure
+    to contagious disease that</em></ins></span> can <span 
class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.  
Software like</em></ins></span> this <span class="removed"><del><strong>way, 
because they pass</strong></del></span> <span class="inserted"><ins><em>should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>should be prosecuted for 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201911190"&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to &lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    a security vulnerability that enabled attackers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
     access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
@@ -3059,137 +3109,235 @@
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
-    subcontractors discloses a thousand confidential voice 
recordings,</em></ins></span>
-    users <span class="removed"><del><strong>through the</strong></del></span> 
<span class="inserted"><ins><em>were easily identified from these 
recordings.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Google &ldquo;Assistant&rdquo; 
records users' conversations</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
+    when <span class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses</em></ins></span> 
proprietary <span class="inserted"><ins><em>software, there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Rather than trying to better</em></ins></span> control <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>person's 
voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
     
-    &lt;p&gt;The app was reporting</strong></del></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="inserted"><ins><em>recordings, Google
-    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by 
a</strong></del></span> person's
-      <span class="removed"><del><strong>body), as well as the vibration 
frequency.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>voice. 
 It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>user wants to 
send to some Google service.&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905061"&gt;
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users</em></ins></span>
-    than <span class="removed"><del><strong>free 
software</strong></del></span> <span class="inserted"><ins><em>is necessary for 
correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers,</em></ins></span> which <span 
class="inserted"><ins><em>store it indefinitely. Even
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if</em></ins></span> users <span class="removed"><del><strong>could 
have
-      checked</strong></del></span> <span class="inserted"><ins><em>request 
deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't cancel the wrong 
of</em></ins></span>
-    collecting <span class="removed"><del><strong>lots</strong></del></span> 
<span class="inserted"><ins><em>it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture</em></ins></span> of 
<span class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>users' life
-    at home, not only in</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true,</strong></del></span> <span 
class="inserted"><ins><em>present,</em></ins></span> but <span 
class="removed"><del><strong>it doesn't really matter. If it had 
sold</strong></del></span> <span class="inserted"><ins><em>in</em></ins></span> 
the <span class="removed"><del><strong>data to a
-      data broker,</strong></del></span> <span class="inserted"><ins><em>past 
(and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>data broker 
would have been able</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
+    advertising companies and government agencies. In other words,
+    deleting</em></ins></span> the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>Nest 
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
+    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span> 
the <span class="removed"><del><strong>time; it is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
+    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is</strong></del></span> <span class="inserted"><ins><em>servers
+    the devices are tethered to. Moreover, they are</em></ins></span> made 
available to <span class="removed"><del><strong>car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>result, Amazon has a very precise 
picture</em></ins></span> of <span class="removed"><del><strong>privacy, and 
should be replaced with anonymous
+      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>users' life
+    at home, not only in the present,</em></ins></span> but <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>figure out
-      who</strong></del></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service staff 
even has access to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
-    the cloud&lt;/a&gt;&rdquo; (a soothing way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no 
way</em></ins></span>
-    to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>know 
what happens to the recordings unless human eavesdroppers &lt;a
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>get the data
+      and hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+&lt;!-- #SpywareAtHome</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS:</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>make sure</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>user is still
-    paying for the subscription, and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers</em></ins></span> found a way to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>country,
+    do you think</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
@@ -3197,457 +3345,365 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>is viewed</strong></del></span> <span 
class="inserted"><ins><em>snoops</em></ins></span> on <span 
class="removed"><del><strong>them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+  &lt;li id="M201706204"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Lots of &ldquo;smart&rdquo; 
products are designed &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>TV reports what it 
is. The existence</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>everyone</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used 
did</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does</em></ins></span> not <span 
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>include 
any way of making</em></ins></span>
-    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>device that can 
obey your voice commands without potentially spying
-    on you.  Even if it</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>air-gapped, 
it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    &lt;p&gt;Today's technological practice does not include any 
way</em></ins></span> of <span 
class="inserted"><ins><em>making</em></ins></span>
+    a <span class="removed"><del><strong>way to
+    disable the surveillance, even</strong></del></span> <span 
class="inserted"><ins><em>device that can obey your voice commands without 
potentially spying
+    on you.  Even</em></ins></span> if it <span 
class="removed"><del><strong>were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't 
expect this has got better.&lt;/p&gt;
 
-&lt;!-- #SpywareAtWork</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal</strong></del></span>
+    data <span class="removed"><del><strong>are totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
+    &lt;p&gt;This</em></ins></span> will
+      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;!-- 
#SpywareOnTheRoad</strong></del></span>
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>teach the 
sheeple</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
+    monitor every aspect of</em></ins></span> what
+      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-<span class="inserted"><ins><em>&lt;h5 
id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
+&lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Internet-enabled watches with 
proprietary software
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. They &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>child and spoof 
messages to and from the watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A very cheap &ldquo;smart 
watch&rdquo; comes with an Android app &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    that connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera</strong></del></span> <span 
class="inserted"><ins><em>article says this</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>a back door, but 
that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>is 
certainly surveillance, at least.&lt;/p&gt;
+    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407090"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>device means the 
manufacturer</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> is <span 
class="removed"><del><strong>using it</strong></del></span> <span 
class="inserted"><ins><em>designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Toyotas will</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    &lt;p&gt;New Toyotas will &lt;a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
     upload data to AWS to help create custom insurance premiums&lt;/a&gt;
-    based</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even</strong></del></span> <span 
class="inserted"><ins><em>driver behaviour.&lt;/p&gt;
+    based on driver behaviour.&lt;/p&gt;
 
     &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
     disconnect its cellular antenna and its GPS antenna.  If you want
-    GPS navigation, get a separate navigator</em></ins></span> which <span 
class="removed"><del><strong>page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>runs free software
-    and works with Open Street Map.&lt;/p&gt;</em></ins></span>
+    GPS navigation, get a separate navigator which runs free software
+    and works</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912171"&gt;
+  &lt;li id="M201912171"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and</em></ins></span> send <span 
class="removed"><del><strong>lots</strong></del></span> <span 
class="inserted"><ins><em>various kinds</em></ins></span> of data to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. For
-    the user, access</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span> <span 
class="inserted"><ins><em>the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>nonfree 
software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>proprietary 
software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data is nearly impossible, 
as it involves
+    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>id="M201903290"&gt;
+  &lt;li id="M201903290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
<span class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because the system has no 
authentication</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;</em></ins></span>
-    when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>they go to a junkyard</em></ins></span> the 
<span class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>driver's personal 
data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data, and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data 
goes</em></ins></span> with <span class="removed"><del><strong>online 
purchases&lt;/a&gt;, exposing all users</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford 
vehicles</em></ins></span> has <span class="removed"><del><strong>no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to</em></ins></span> the <span 
class="inserted"><ins><em>internal</em></ins></span> car <span 
class="inserted"><ins><em>network&lt;/a&gt;. It</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>constantly
-    connected</em></ins></span> to the <span 
class="inserted"><ins><em>cellular phone network and sends Ford a lot of data,
-    including</em></ins></span> car <span 
class="removed"><del><strong>remotely,</strong></del></span> <span 
class="inserted"><ins><em>location. This feature operates even 
when</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span 
class="inserted"><ins><em>ignition
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in 
breaking</em></ins></span> the <span class="removed"><del><strong>phone company 
to track</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by 
disconnecting</em></ins></span> the <span class="removed"><del><strong>car's 
movements all</strong></del></span> <span class="inserted"><ins><em>cellular 
modem, or wrapping</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span>
-    <span class="inserted"><ins><em>antenna in aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
+    antenna</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In China,</em></ins></span> it is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
-    cars to be equipped with a terminal that &lt;a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;</em></ins></span>
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201810230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span>
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked the choices</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>radio 
programs&lt;/a&gt;</em></ins></span> in <span class="removed"><del><strong>this 
article, is</strong></del></span> <span class="inserted"><ins><em>its
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did</em></ins></span> not
-      <span class="removed"><del><strong>really a matter of proprietary 
surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>get users' consent,</em></ins></span> but <span 
class="removed"><del><strong>the invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>it could have got that easily</em></ins></span> by 
<span class="removed"><del><strong>proprietary malware in</strong></del></span>
-    <span class="inserted"><ins><em>sneaking it into</em></ins></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The</em></ins></span> cars <span 
class="removed"><del><strong>allow the company</strong></del></span> <span 
class="inserted"><ins><em>can also collect lots of other data: 
listening</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>you,
-    watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>remotely and
-      determine</strong></del></span> <span 
class="inserted"><ins><em>collection should be forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you really want to be safe, we must make 
sure</em></ins></span> the car's <span class="removed"><del><strong>location 
at</strong></del></span>
-    <span class="inserted"><ins><em>hardware cannot collect</em></ins></span> 
any <span class="removed"><del><strong>time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if the state orders it to 
get</strong></del></span> <span class="inserted"><ins><em>of that data, or 
that</em></ins></span> the <span class="removed"><del><strong>data
-      and hand</strong></del></span> <span class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>won't 
collect any of that data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
+    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
+      transmission reports a 404 error really means nothing; the server
+      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
 
+      &lt;p&gt;LG later said it had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>the software
+    is free so we know it won't collect</em></ins></span> any <span 
class="removed"><del><strong>product
+      could spy this way.&lt;/p&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;AI-powered driving apps 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about the user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+&lt;!-- #SpywareAtPlay</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span>
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Users</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software</em></ins></span> are <span 
class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
+  &lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>built-in
-    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
-    when accessed through the modem.  However, even if it asked
-    for authentication, you couldn't be confident</em></ins></span> that <span 
class="inserted"><ins><em>Nissan
-    has no access.  The software in the car</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even</strong></del></span> <span 
class="inserted"><ins><em>proprietary, &lt;a
+    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
     href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even</em></ins></span> if <span class="inserted"><ins><em>no one 
connects to</em></ins></span> the <span class="removed"><del><strong>image is 
coming from</strong></del></span> <span class="inserted"><ins><em>car 
remotely,</em></ins></span> the <span class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>cell phone 
modem
-    enables</em></ins></span> the <span class="removed"><del><strong>TV 
reports what it is. The existence of a way</strong></del></span> <span 
class="inserted"><ins><em>phone company</em></ins></span> to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>car's movements all 
the time;</em></ins></span>
-    it <span class="removed"><del><strong>was in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>is possible to physically remove</em></ins></span> 
the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
+&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
+    it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cell phone 
modem, though.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;This shows that laws requiring products</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars allow the company</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>extract</em></ins></span>
-    data <span class="removed"><del><strong>are totally inadequate.
-      And what happens</strong></del></span> <span 
class="inserted"><ins><em>remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
+    &lt;p&gt;Tesla cars allow the company to extract
+    data remotely and determine the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but</em></ins></span> if <span class="removed"><del><strong>a 
user declines consent?  Probably</strong></del></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>state orders it</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>data and hand it
-    over,</em></ins></span> the <span class="removed"><del><strong>user 
watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>state can store it.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software</em></ins></span> in 
<span class="removed"><del><strong>spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It</strong></del></span>
+    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, 
which</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>made
-    available</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance companies, and 
others.&lt;/p&gt;
-
-    &lt;p&gt;The case of toll-collection systems, mentioned 
in</em></ins></span> this <span class="removed"><del><strong>off, but having it 
enabled by default</strong></del></span> <span 
class="inserted"><ins><em>article,</em></ins></span>
-    is <span class="inserted"><ins><em>not really a matter of proprietary 
surveillance. These systems
-    are</em></ins></span> an <span class="removed"><del><strong>injustice 
already.&lt;/p&gt;
-  &lt;/li&gt;
+    records information</em></ins></span> about <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
+    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
+    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
+      companies.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>intolerable invasion of privacy, and should be 
replaced</em></ins></span> with <span class="removed"><del><strong>Viacom adds 
2.3 million households to
-      the 600 millions social media profiles</strong></del></span>
-    <span class="inserted"><ins><em>anonymous payment systems, 
but</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being 
watched</strong></del></span> <span 
class="inserted"><ins><em>done</em></ins></span> by
-      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
+      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3661,164 +3717,121 @@
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require</em></ins></span>
-    users to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>identify 
themselves</em></ins></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop</em></ins></span> on <span 
class="inserted"><ins><em>Oculus users.&lt;/p&gt;
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential for the most intimate
+    creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
+
+      &lt;p&gt;While</strong></del></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software as malicious as many</em></ins></span> other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>programs listed</em></ins></span> in
-      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>this
+    software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You</em></ins></span> can
-      <span class="removed"><del><strong>correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span> <span 
class="inserted"><ins><em>bet Facebook will implement the maximum possible
-    surveillance on Oculus Rift devices. The moral is, never 
trust</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>VR
+    &lt;p&gt;You</em></ins></span> can <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the 
<span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
     system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span> <span 
class="inserted"><ins><em>Web&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy</em></ins></span> on <span 
class="removed"><del><strong>the internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
-      give</strong></del></span> <span class="inserted"><ins><em>their 
visitors.  Web sites are not
-   programs, so</em></ins></span> it
-   <span class="inserted"><ins><em>&lt;a 
href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense</em></ins></span> to <span class="removed"><del><strong>the 
US</strong></del></span> <span class="inserted"><ins><em>call them 
&ldquo;free&rdquo;</em></ins></span> or <span class="removed"><del><strong>some 
other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance</em></ins></span> is <span 
class="removed"><del><strong>not to be trusted unless</strong></del></span> 
<span class="inserted"><ins><em>an abuse all the same.&lt;/p&gt;
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
+   programs, so it
+   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance is an abuse all the same.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;When</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of April 2019,</em></ins></span> it is <span 
class="removed"><del><strong>done
-    by free software in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be 
transmitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible</em></ins></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>disable an
-    unscrupulous tracking anti-feature&lt;/a&gt; that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    &lt;p&gt;As of April 2019, it is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge</em></ins></span> and <span 
class="inserted"><ins><em>also in</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>upcoming Microsoft Edge that is
-    going</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>be based on Chromium.&lt;/p&gt;
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    going to be based on Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901101"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Until 2015, any tweet</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports</strong></del></span> <span 
class="inserted"><ins><em>listed</em></ins></span> a <span 
class="removed"><del><strong>404 error really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>geographical tag</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent</em></ins></span> the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>precise GPS location</em></ins></span> to <span 
class="removed"><del><strong>stop this, but any product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201805170"&gt;
+  &lt;li id="M201805170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Storyful program &lt;a
-    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies</em></ins></span>
-    on <span class="removed"><del><strong>what programs people watch, and even 
what they wanted to record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the reporters that use 
it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtPlay</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701060"&gt;
+  &lt;li id="M201701060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;When</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>page uses Disqus</em></ins></span>
-    for <span class="removed"><del><strong>its headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span 
class="inserted"><ins><em>comments,</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>proprietary Disqus software &lt;a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
-    a Facebook software package into</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>browser</em></ins></span> of <span 
class="removed"><del><strong>the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>every 
anonymous visitor</em></ins></span>
-    to <span class="removed"><del><strong>along with the headphone's unique 
serial number.
-&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;When</em></ins></span> a page uses Disqus
+    for comments, <span class="removed"><del><strong>&lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus 
software <span class="removed"><del><strong>loads</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</em></ins></span>
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-&lt;p&gt;The suit accuses that this was done without</strong></del></span> the 
<span class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>page, and 
makes</em></ins></span> the <span class="removed"><del><strong>fine 
print</strong></del></span> <span class="inserted"><ins><em>page's URL 
available to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612064"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Online sales, with tracking and surveillance</em></ins></span> of 
<span class="removed"><del><strong>the app said that users gave consent for 
this,
-would that make it acceptable? No way! It should be flat 
out</strong></del></span> <span 
class="inserted"><ins><em>customers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>show different people different prices&lt;/a&gt;. 
Most of</em></ins></span>
-    the <span class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>tracking is done by recording interactions with 
servers, but
+    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
     proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
+      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook to track visitors</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>directly 
examine users'
+    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
+      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
     data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -3827,35 +3840,29 @@
   <span class="inserted"><ins><em>&lt;li id="M201210240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites rat their visitors to advertising
-    networks that track users.  Of the top 1000 web sites,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-    (as of 5/17/2012) fed</em></ins></span> their <span 
class="removed"><del><strong>users and</strong></del></span> <span 
class="inserted"><ins><em>visitors third-party cookies, allowing
+    &lt;p&gt;Many</em></ins></span> web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
     other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201208210"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites</em></ins></span> report <span 
class="inserted"><ins><em>all their visitors</em></ins></span>
-    to <span class="inserted"><ins><em>Google by using</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>Google Analytics service, which &lt;a
+    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the page that was 
visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
+  &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites try to</em></ins></span> collect <span 
class="removed"><del><strong>a wide range</strong></del></span> <span 
class="inserted"><ins><em>users' address books (the user's 
list</em></ins></span>
-    of <span class="removed"><del><strong>data about 
their</strong></del></span> <span class="inserted"><ins><em>other people's 
phone numbers or email addresses).  This violates
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
     the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3864,12 +3871,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors to those 
pages&lt;/a&gt;&mdash;even</em></ins></span> users <span 
class="removed"><del><strong>and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad 
networks</strong></del></span>
-    that <span class="removed"><del><strong>merge the data
-      collected by various cr&hellip;apps and</strong></del></span> <span 
class="inserted"><ins><em>don't have Facebook accounts.&lt;/p&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3883,35 +3886,36 @@
   &lt;li id="M201811270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web</em></ins></span> sites <span 
class="removed"><del><strong>made by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They</strong></del></span> use <span 
class="removed"><del><strong>this data</strong></del></span> <span 
class="inserted"><ins><em>JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>manipulate 
people</strong></del></span> <span class="inserted"><ins><em>snoop on 
information that users have typed into a
-    form but not sent&lt;/a&gt;, in order</em></ins></span> to <span 
class="removed"><del><strong>buy things, and hunt</strong></del></span> <span 
class="inserted"><ins><em>learn their identity. Some are &lt;a
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
-    getting sued&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>&ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>this.&lt;/p&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also</strong></del></span> <span class="inserted"><ins><em>some customer 
services</em></ins></span> use <span class="removed"><del><strong>a back 
door</strong></del></span> <span class="inserted"><ins><em>the same sort of
-    malware</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what</em></ins></span> the <span class="removed"><del><strong>game 
play for specific players.&lt;/p&gt;
-
-      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>user is typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;
+    read what the user is typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807190"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
-    its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript on its</em></ins></span> web <span 
class="removed"><del><strong>sites try</strong></del></span> <span 
class="inserted"><ins><em>site</em></ins></span> to <span 
class="removed"><del><strong>collect users' address books (the
+      user's list of other people's phone numbers or email addresses).
+      This violates the privacy of those</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> other <span 
class="removed"><del><strong>people.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201712300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201712300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some JavaScript malware &lt;a
@@ -3923,234 +3927,181 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all</em></ins></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>user's input, &lt;a
-    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which</em></ins></span>
-    can <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>then be used to reproduce</em></ins></span> the <span 
class="removed"><del><strong>same tactics.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>whole session&lt;/a&gt;.&lt;/p&gt;
+    JavaScript code to collect all</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>identify 
users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash Player's &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Flash Player's &lt;a
     
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps</em></ins></span> web sites <span 
class="removed"><del><strong>spy on their visitors.  Web sites are not
-   programs, so it</strong></del></span> <span class="inserted"><ins><em>track 
visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense</strong></del></span>
+    &lt;p&gt;Google</em></ins></span> Chrome <span 
class="removed"><del><strong>contains a key logger that</strong></del></span> 
<span class="inserted"><ins><em>is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL typed in&lt;/a&gt;, one key 
at</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
     instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report the sites they visit</em></ins></span> to 
<span class="removed"><del><strong>call</strong></del></span> <span 
class="inserted"><ins><em>advertising and
-    data companies, first of all to Google. Moreover, if users have a
-    Gmail account, Chrome automatically logs</em></ins></span> them <span 
class="removed"><del><strong>&ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but</strong></del></span> <span class="inserted"><ins><em>in 
to</em></ins></span> the <span class="inserted"><ins><em>browser for
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users 
have</em></ins></span> a <span class="removed"><del><strong>time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
+    <span class="inserted"><ins><em>Gmail account,</em></ins></span> Chrome 
<span class="removed"><del><strong>includes</strong></del></span> <span 
class="inserted"><ins><em>automatically logs them in to the browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way to escape</em></ins></span> surveillance is <span 
class="removed"><del><strong>an abuse all the same.&lt;/p&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;When</strong></del></span> <span 
class="inserted"><ins><em>to switch to &lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>page uses Disqus</strong></del></span> <span 
class="inserted"><ins><em>modified version of Firefox
+    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
+    href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>module</strong></del></span> <span 
class="inserted"><ins><em>modified version of Firefox
     with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Low-priced Chromebooks</em></ins></span> for
-  <span class="removed"><del><strong>comments,</strong></del></span> <span 
class="inserted"><ins><em>schools are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
-  proprietary Disqus software loads a Facebook software package 
into</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span 
class="removed"><del><strong>browser</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
-    of <span class="removed"><del><strong>every anonymous visitor 
to</strong></del></span> <span class="inserted"><ins><em>transparency 
on</em></ins></span> the <span class="removed"><del><strong>page, and 
makes</strong></del></span> <span class="inserted"><ins><em>part of 
both</em></ins></span> the
-  <span class="removed"><del><strong>page's URL available to 
Facebook&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>educational services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
-    schools, the difficulty</em></ins></span> of <span 
class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-      businesses to show different people different prices&lt;/a&gt;. 
Most</strong></del></span> <span class="inserted"><ins><em>opting 
out</em></ins></span> of <span class="inserted"><ins><em>these services, 
and</em></ins></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
     of proper privacy policies, among other things.&lt;/p&gt;
 
-    &lt;p&gt;But complaining</em></ins></span> is <span 
class="removed"><del><strong>done by recording interactions with
-      servers, but proprietary software contributes.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input</strong></del></span> <span 
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span> 
and <span class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Pages</strong></del></span> <span 
class="inserted"><ins><em>teachers
-    should realize</em></ins></span> that <span 
class="removed"><del><strong>contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook</strong></del></span> <span 
class="inserted"><ins><em>the software Google uses</em></ins></span> to <span 
class="removed"><del><strong>track visitors</strong></del></span> <span 
class="inserted"><ins><em>spy on students is
-    nonfree, so they can't verify what it really does. The only remedy 
is</em></ins></span>
-    to <span class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors</strong></del></span> 
<span class="inserted"><ins><em>persuade school officials</em></ins></span> to 
<span class="removed"><del><strong>advertising networks that track
-      users.  Of the top 1000 web sites,</strong></del></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
-      sites to track them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many web sites report all</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt; for both education and school
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize</em></ins></span> that <span class="inserted"><ins><em>the 
software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both 
education</em></ins></span> and <span class="removed"><del><strong>transmits 
audio</strong></del></span> <span class="inserted"><ins><em>school
     administration. If the school is run locally, parents and teachers
-    can mandate</em></ins></span> their <span 
class="removed"><del><strong>visitors</strong></del></span> <span 
class="inserted"><ins><em>representatives at the School Board</em></ins></span> 
to <span class="removed"><del><strong>Google by using</strong></del></span> 
<span class="inserted"><ins><em>refuse</em></ins></span> the <span 
class="removed"><del><strong>Google Analytics service, which
-      &lt;a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google</strong></del></span>
-    <span class="inserted"><ins><em>budget unless</em></ins></span> the <span 
class="removed"><del><strong>IP address and</strong></del></span> <span 
class="inserted"><ins><em>school initiates a switch to free software. If
+    can mandate their representatives at the School Board</em></ins></span> to 
<span class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>refuse the
+    budget unless the school initiates a switch to free software. If
     education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
-    etc.) to migrate</em></ins></span> the <span 
class="removed"><del><strong>page that was 
visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>public schools to free 
software.&lt;/p&gt;</em></ins></span>
+    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites 
try</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome makes it easy for an extension</em></ins></span> to 
<span class="removed"><del><strong>collect users' address books (the
-      user's list of other people's phone numbers or email addresses).
-      This violates</strong></del></span> <span class="inserted"><ins><em>do 
&lt;a
+    &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>user's browsing&lt;/a&gt;, and many</em></ins></span> 
of <span class="removed"><del><strong>those other 
people.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>them do 
so.&lt;/p&gt;</em></ins></span>
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows the NSA</strong></del></span>
-
   <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Chrome includes a module that &lt;a
     
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
+  &lt;li id="M201308040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Chrome &lt;a
     href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
-    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span> <span class="inserted"><ins><em>browser 
history, affiliations&lt;/a&gt;, and other installed
+    spies on browser history, affiliations&lt;/a&gt;, and other installed
     software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200809060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Google</em></ins></span> Chrome 
contains a key logger that &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
+    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome 
includes</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;/li&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInNetworks"&gt;Spyware in Networks&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-section"&gt;
+  &lt;h3 id="SpywareInNetworks"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Networks&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Flash Player's</strong></del></span>
+<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202012250"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HonorLock online exam
-    proctoring program is</em></ins></span> a <span 
class="removed"><del><strong>module</strong></del></span> <span 
class="inserted"><ins><em>surveillance tool</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
-    students</em></ins></span> and <span 
class="removed"><del><strong>transmits audio to its servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and 
activists.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for</strong></del></span> 
<span class="inserted"><ins><em>collects data&lt;/a&gt; such as face, driving 
license, and
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program</em></ins></span> is <span 
class="removed"><del><strong>also used</strong></del></span> <span 
class="inserted"><ins><em>a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
     network information, among others, in blatant violation of students'
     privacy.&lt;/p&gt;
 
-    &lt;p&gt;Preventing students from cheating should not be</em></ins></span> 
an <span class="removed"><del><strong>extension to do &lt;a
-    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping</strong></del></span> <span class="inserted"><ins><em>excuse for
-    running malware/spyware</em></ins></span> on <span 
class="removed"><del><strong>the user's 
browsing&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their 
computers,</em></ins></span> and <span 
class="removed"><del><strong>many</strong></del></span> <span 
class="inserted"><ins><em>it's good that students
+    &lt;p&gt;Preventing students from cheating should not be an 
excuse</em></ins></span> for
+    <span class="inserted"><ins><em>running malware/spyware on their 
computers, and it's good that students
     are protesting. But their petitions overlook a crucial issue, namely,
-    the injustice</em></ins></span> of <span class="removed"><del><strong>them 
do so.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>being forced to run nonfree 
software</em></ins></span> in <span 
class="removed"><del><strong>Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's
-      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>order to
-    get an education.&lt;/p&gt;</em></ins></span>
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202009070"&gt;
+  &lt;li id="M202009070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;While the world</em></ins></span> is <span 
class="removed"><del><strong>also used for</strong></del></span> <span 
class="inserted"><ins><em>still
+    &lt;p&gt;While the world is still
     struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
       &ldquo;fingerprinting&rdquo; devices &lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
@@ -4320,7 +4271,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/16 17:33:27 $
+$Date: 2021/04/11 13:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.398
retrieving revision 1.399
diff -u -b -r1.398 -r1.399
--- proprietary-surveillance.it.po      16 Mar 2021 17:33:28 -0000      1.398
+++ proprietary-surveillance.it.po      11 Apr 2021 13:04:34 -0000      1.399
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5454,6 +5454,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 "href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
 "against-proctoring-surveillance-apps\">tracks students and collects data</a> "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary-surveillance.ja-diff.html       16 Mar 2021 17:33:28 -0000      
1.260
+++ proprietary-surveillance.ja-diff.html       11 Apr 2021 13:04:34 -0000      
1.261
@@ -1184,9 +1184,11 @@
   &lt;li id="M201409220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
+    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="inserted"><ins><em>regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
@@ -1211,8 +1213,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and
-    <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
@@ -3075,20 +3077,13 @@
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="removed"><del><strong>make statements about
-      their products, rather than free software which users can check
-      and change.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
@@ -3096,96 +3091,82 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+  &lt;li id="M201706204"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Lots of &ldquo;smart&rdquo; 
products are designed &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>everyone</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used 
did</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does</em></ins></span> not <span 
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>include 
any way of making</em></ins></span>
-    a <span class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>device that can 
obey your voice commands without potentially spying
-    on you.  Even if it</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>air-gapped, 
it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    &lt;p&gt;Today's technological practice does not include any way of 
making</em></ins></span>
+    a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>device 
that</em></ins></span> can <span class="removed"><del><strong>check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  &lt;li id="M201407170"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork</strong></del></span>
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed</em></ins></span> to spy on <span 
class="removed"><del><strong>children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
+    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find</em></ins></span> it <span 
class="inserted"><ins><em>normal that companies
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>find it normal 
that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3196,18 +3177,30 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Internet-enabled watches with proprietary software
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Internet-enabled watches with 
proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. They &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    privacy. In addition, they have a lot of security flaws. 
They</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
     &lt;p&gt;Thus, ill-intentioned unauthorized people</em></ins></span> can 
<span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>intercept communications between parent and child and 
spoof messages to and from</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3217,10 +3210,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
@@ -3241,18 +3236,28 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Toyotas will</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
-    based on driver behaviour.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;New Toyotas will &lt;a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    upload data</em></ins></span> to <span class="removed"><del><strong>place 
new items</strong></del></span> <span class="inserted"><ins><em>AWS to help 
create custom insurance premiums&lt;/a&gt;
+    based</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span> <span class="inserted"><ins><em>driver 
behaviour.&lt;/p&gt;
 
     &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
     disconnect its cellular antenna and its GPS antenna.  If you want
@@ -3262,33 +3267,6 @@
 
   &lt;li id="M201912171"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as it involves
-    cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Tesla cars collect lots of 
personal data, and &lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection</strong></del></span> <span 
class="inserted"><ins><em>a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902011"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 
 <span class="removed"><del><strong>&lt;div class="big-section"&gt;
@@ -3303,30 +3281,20 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Most modern cars 
now</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
-    including car location. This feature operates</em></ins></span> even when 
the <span class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>ignition
-    key is removed, and users report that they can't disable it.&lt;/p&gt;
-
-    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity by disconnecting</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>cellular modem, or wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201811300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In China,</em></ins></span> it <span class="inserted"><ins><em>is 
mandatory for electric
-    cars</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data</em></ins></span> is 
<span class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>nearly impossible, as</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -3334,14 +3302,42 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span> <span class="inserted"><ins><em>be equipped with 
a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
+
+    &lt;p&gt;If you own one of these cars, have you 
succeeded</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> <span 
class="inserted"><ins><em>breaking</em></ins></span> the
+      <span class="removed"><del><strong>Kindle:</strong></del></span>
+    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem, or wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
     to a government-run platform&lt;/a&gt;. In practice,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
       they report even which page</strong></del></span>
@@ -3449,15 +3445,16 @@
     &lt;p&gt;The case of toll-collection systems, mentioned in this article,
     is not really a matter of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but the invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    anonymous payment systems, but the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
       determine the car's location at any time. (See
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
       Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
       store this information, but if the state orders it to get the data
-      and hand it over, the state can store it.&lt;/p&gt;
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>state can store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3483,46 +3480,47 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users</em></ins></span> to <span class="removed"><del><strong>get users' 
formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the 
TV</strong></del></span> <span class="inserted"><ins><em>identify themselves to 
Facebook&lt;/a&gt;. This</em></ins></span> will <span 
class="removed"><del><strong>say, &ldquo;Without your 
consent</strong></del></span> <span class="inserted"><ins><em>give Facebook
-    free rein</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users</em></ins></span> to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>identify themselves to Facebook&lt;/a&gt;. This will 
give Facebook
+    free rein to pervasively snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    creates</em></ins></span> the <span class="removed"><del><strong>other 
way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>potential for the 
most intimate
-    surveillance ever. All it takes</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make this potential real &lt;a
-    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software as malicious as many other programs listed in this
-    page&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>potential for the 
most intimate
+    surveillance ever. All it takes to make this potential 
real</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software</em></ins></span> as <span class="removed"><del><strong>of 2014, 
but we don't expect</strong></del></span> <span 
class="inserted"><ins><em>malicious as many other programs listed 
in</em></ins></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the 
TV</strong></del></span>
+    <span class="inserted"><ins><em>page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
+    &lt;p&gt;You can bet Facebook</em></ins></span> will
+      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span 
class="inserted"><ins><em>implement</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
     surveillance on Oculus Rift devices. The moral is, never 
trust</em></ins></span> a <span class="removed"><del><strong>step further than 
other TV manufacturers</strong></del></span> <span class="inserted"><ins><em>VR
@@ -3561,54 +3559,53 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;As of April 2019, it is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span>
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>disable an
-    unscrupulous tracking anti-feature&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+    longer possible</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>also in the 
upcoming Microsoft Edge that is
+    going</em></ins></span> to be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running</strong></del></span> <span 
class="inserted"><ins><em>based</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as to determine that they are nearby.  Once your
       Internet devices are paired with your TV, advertisers can
       correlate ads with Web activity, and
-      other</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs 
recognize</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
-    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge</em></ins></span> and
-      <span class="removed"><del><strong>&lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>also in the upcoming Microsoft Edge that is
-    going to be based on Chromium.&lt;/p&gt;</em></ins></span>
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chromium.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201901101"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical 
tag</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>precise GPS location to Twitter's 
server&lt;/a&gt;. It still
+    &lt;p&gt;Until 2015, any tweet that listed</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>geographical tag &lt;a
+    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
     contains these GPS locations.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201805170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Storyful program</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies</em></ins></span>
-    on the <span class="removed"><del><strong>internet</strong></del></span> 
<span class="inserted"><ins><em>reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Storyful program</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>reporters that use 
it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201701060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201701060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;When a page uses Disqus
-    for comments, the proprietary Disqus software &lt;a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
-    a Facebook software package into the browser of every anonymous 
visitor</em></ins></span>
+    for comments, the proprietary Disqus software</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>browser of every anonymous visitor</em></ins></span>
     to <span class="removed"><del><strong>another
     company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the page,</em></ins></span> and <span 
class="removed"><del><strong>would then have</strong></del></span> <span 
class="inserted"><ins><em>makes the page's URL available</em></ins></span> to
       <span class="removed"><del><strong>give it</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
@@ -3624,16 +3621,14 @@
       &lt;p&gt;Speech recognition is not to be trusted unless 
it</strong></del></span> <span 
class="inserted"><ins><em>tracking</em></ins></span> is done by <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>recording interactions with servers, but
     proprietary</em></ins></span> software <span 
class="removed"><del><strong>in your own 
computer.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>contributes.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>directly examine 
users'
+    Microsoft SkyDrive allows the NSA to directly examine users'
     data&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3641,103 +3636,75 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites rat their visitors to advertising
-    networks</em></ins></span> that <span class="inserted"><ins><em>track 
users.  Of</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>top 1000 web sites,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on</strong></del></span>
+    networks that track users.  Of the top 1000 web sites,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-    (as of 5/17/2012) fed their visitors third-party cookies, 
allowing</em></ins></span>
-    other <span class="removed"><del><strong>devices on the user's local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>sites</em></ins></span> to <span 
class="removed"><del><strong>stop this, but any product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>track them&lt;/a&gt;.&lt;/p&gt;
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201208210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites report all their visitors
-    to Google by using the Google Analytics service, which</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
+    to Google by using</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>Google Analytics service, which &lt;a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+    tells Google the IP address</em></ins></span> and the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>page that was visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list</em></ins></span>
-    of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other people's phone numbers or email addresses).  
This violates
-    the privacy of those other people.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Many web sites try</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>collect users' 
address books (the user's list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
+  &lt;li id="M201110040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>those pages&lt;/a&gt;&mdash;even users
-    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites use JavaScript code</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to</em></ins></span> snoop on <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>information that</em></ins></span> users <span 
class="removed"><del><strong>and report</strong></del></span> <span 
class="inserted"><ins><em>have typed into a
-    form but not sent&lt;/a&gt;, in order</em></ins></span> to <span 
class="inserted"><ins><em>learn their identity. Some are &lt;a
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information</em></ins></span> that <span 
class="inserted"><ins><em>users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
     &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; 
even</strong></del></span> <span class="inserted"><ins><em>same sort of
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>same sort of
     malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read</em></ins></span> what <span class="removed"><del><strong>their users 
weigh.&lt;/p&gt;
+    read what</em></ins></span> the <span class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
 
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>the user</em></ins></span> is <span 
class="removed"><del><strong>a computer, and you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>user is typing before</em></ins></span> it <span 
class="inserted"><ins><em>is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
+  &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data about their users and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-      collected by various cr&hellip;apps and sites made by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this data</strong></del></span>
+    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>give other companies personal data on
-    its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web 
site to give</em></ins></span> other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>companies personal data</em></ins></span> on
+    <span class="inserted"><ins><em>its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
@@ -3752,49 +3719,59 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code</em></ins></span> to <span 
class="removed"><del><strong>buy things, and hunt 
-      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>collect all the user's input, &lt;a
-    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which</em></ins></span>
-    can <span class="inserted"><ins><em>then</em></ins></span> be <span 
class="removed"><del><strong>led to spend a lot of money. They 
-      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>used</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>reproduce</em></ins></span> the <span 
class="removed"><del><strong>game play for specific players.&lt;/p&gt;
+    JavaScript code to collect all</em></ins></span> the user's <span 
class="removed"><del><strong>local network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;While the article describes gratis games, games that cost money 
-      can</strong></del></span> <span class="inserted"><ins><em>whole 
session&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+      could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;If you</em></ins></span> use <span 
class="removed"><del><strong>the same tactics.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>LibreJS, it will block that malicious JavaScript
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>input,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
 
 
 &lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
   &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 <span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy on their visitors.  Web 
sites</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash and JavaScript</em></ins></span> are <span 
class="removed"><del><strong>not
-   programs, so it</strong></del></span> <span class="inserted"><ins><em>used 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;
+    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>JavaScript are used for &lt;a
+    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>the 
+      internet&lt;/a&gt;&mdash; even what their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201003010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash Player's &lt;a
-    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
+    &lt;p&gt;Flash Player's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
     cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3809,38 +3786,69 @@
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome</em></ins></span> is an <span 
class="removed"><del><strong>abuse all</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Google Chrome is an &lt;a
     
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report</em></ins></span> the <span 
class="removed"><del><strong>same.&lt;/p&gt;
+    instrument</em></ins></span> of <span class="removed"><del><strong>data 
about their users and their</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade</em></ins></span>
+    users' 
+      <span class="removed"><del><strong>friends</strong></del></span> <span 
class="inserted"><ins><em>computers</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected by various cr&hellip;apps and</strong></del></span> sites 
<span class="removed"><del><strong>made by different 
+      companies.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>sites they visit to advertising</em></ins></span> and 
<span class="removed"><del><strong>surveillance</strong></del></span>
-    <span class="inserted"><ins><em>data companies, first</em></ins></span> of 
<span class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-      businesses</strong></del></span> <span class="inserted"><ins><em>all to 
Google. Moreover, if users have a
-    Gmail account, Chrome automatically logs them in</em></ins></span> to 
<span class="removed"><del><strong>show different people different 
prices&lt;/a&gt;. Most
-      of</strong></del></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>browser for
+      &lt;p&gt;They use this</strong></del></span> <span 
class="inserted"><ins><em>they visit to advertising and</em></ins></span>
+    data <span class="inserted"><ins><em>companies, first of all to Google. 
Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way to escape surveillance</em></ins></span> is <span 
class="removed"><del><strong>done by recording 
interactions</strong></del></span> <span class="inserted"><ins><em>to switch to 
&lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of 
Firefox</em></ins></span>
-    with
-      <span class="removed"><del><strong>servers, but proprietary software 
contributes.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>several changes to protect users' 
privacy.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The best way</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>escape surveillance is</em></ins></span> to <span 
class="removed"><del><strong>buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>modified version</em></ins></span> of <span 
class="removed"><del><strong>money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Firefox
+    with several changes</em></ins></span> to <span 
class="removed"><del><strong>manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While the article describes gratis games, games that cost money 
+      can use the same tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input</strong></del></span>
+&lt;!-- #SpywareOnTheWeb</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Low-priced Chromebooks for 
schools are &lt;a
     href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
-    collecting far more data on students than is necessary,</em></ins></span> 
and <span class="removed"><del><strong>Chinese-input apps 
spy</strong></del></span> <span class="inserted"><ins><em>store
-    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
-    of transparency</em></ins></span> on <span 
class="removed"><del><strong>users.&lt;/a&gt;&lt;/p&gt;
+    collecting far more data</em></ins></span> on <span 
class="inserted"><ins><em>students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>Web&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;p&gt;In addition, many web sites spy</strong></del></span> <span 
class="inserted"><ins><em>lack
+    of transparency</em></ins></span> on <span 
class="removed"><del><strong>their visitors.  Web sites are not
+   programs, so it
+   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but</strong></del></span> the <span 
class="removed"><del><strong>surveillance is an abuse all</strong></del></span> 
<span class="inserted"><ins><em>part of both</em></ins></span> the <span 
class="removed"><del><strong>same.&lt;/p&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>educational services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
+    schools, the difficulty</em></ins></span> of <span 
class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+      businesses to show different people different prices&lt;/a&gt;. 
Most</strong></del></span> <span class="inserted"><ins><em>opting 
out</em></ins></span> of <span class="inserted"><ins><em>these services, 
and</em></ins></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining</em></ins></span> is <span 
class="removed"><del><strong>done by recording interactions with
+      servers, but proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input</strong></del></span> <span 
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span> 
and <span class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
@@ -3849,21 +3857,17 @@
       users that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors to advertising networks 
that track
+  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors to advertising 
networks</strong></del></span> <span class="inserted"><ins><em>teachers
+    should realize</em></ins></span> that <span 
class="removed"><del><strong>track
       users.  Of</strong></del></span> the <span 
class="removed"><del><strong>top 1000 web sites, &lt;a
       
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as</strong></del></span> <span 
class="inserted"><ins><em>part</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing</strong></del></span> <span class="inserted"><ins><em>both the 
educational services and the
-    schools, the difficulty of opting out of these services, and the lack
-    of proper privacy policies, among</em></ins></span> other
-      <span class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
-
-    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize that the software Google uses to spy on students is
-    nonfree, so they can't verify what it really does. The only remedy 
is</em></ins></span>
-    to <span class="removed"><del><strong>track them&lt;/a&gt;.&lt;/p&gt;
+      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+      sites</strong></del></span> <span class="inserted"><ins><em>software 
Google uses</em></ins></span> to <span class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites report all their 
visitors</strong></del></span> <span class="inserted"><ins><em>persuade school 
officials</em></ins></span> to <span class="removed"><del><strong>Google by 
using
+  &lt;li&gt;&lt;p&gt;Many web sites report all their 
visitors</strong></del></span> <span class="inserted"><ins><em>spy on students 
is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials</em></ins></span> to <span 
class="removed"><del><strong>Google by using
       the Google Analytics service, which</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
       tells Google</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
     exclusively use free software&lt;/a&gt; for both education and school
@@ -3942,30 +3946,41 @@
 <span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202012250"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and 
activists.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202012250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The HonorLock online exam
-    proctoring program is a surveillance tool that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    proctoring program</em></ins></span> is <span 
class="removed"><del><strong>also used</strong></del></span> <span 
class="inserted"><ins><em>a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
     students and collects data&lt;/a&gt; such as face, driving license, and
     network information, among others, in blatant violation of students'
     privacy.&lt;/p&gt;
 
-    &lt;p&gt;Preventing students from cheating should not be an excuse for
-    running malware/spyware on their computers, and it's good that students
+    &lt;p&gt;Preventing students from cheating should not be an 
excuse</em></ins></span> for
+    <span class="inserted"><ins><em>running malware/spyware on their 
computers, and it's good that students
     are protesting. But their petitions overlook a crucial issue, namely,
     the injustice of being forced to run nonfree software in order to
-    get an education.&lt;/p&gt;</em></ins></span>
+    get an education.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202009070"&gt;
+  &lt;li id="M202009070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;While the world</em></ins></span> is <span 
class="removed"><del><strong>also used for</strong></del></span> <span 
class="inserted"><ins><em>still
+    &lt;p&gt;While the world is still
     struggling with COVID-19 coronavirus, many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
       &ldquo;fingerprinting&rdquo; devices &lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
@@ -4135,7 +4150,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/03/16 17:33:28 $
+$Date: 2021/04/11 13:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary-surveillance.ja.po      16 Mar 2021 17:33:28 -0000      1.380
+++ proprietary-surveillance.ja.po      11 Apr 2021 13:04:34 -0000      1.381
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4368,6 +4368,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 "href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
 "against-proctoring-surveillance-apps\">tracks students and collects data</a> "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary-surveillance.pot        16 Mar 2021 17:33:28 -0000      1.319
+++ proprietary-surveillance.pot        11 Apr 2021 13:04:34 -0000      1.320
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3543,6 +3543,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a "
+"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
+"over personal data of Indian protesters and activists to Indian police</a> "
+"which leaded to their arrest. The cops requested the IP address and the "
+"location where a document was created and with those information, they "
+"identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\";>tracks
 "
 "students and collects data</a> such as face, driving license, and network "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.701
retrieving revision 1.702
diff -u -b -r1.701 -r1.702
--- proprietary-surveillance.ru.po      16 Mar 2021 19:32:41 -0000      1.701
+++ proprietary-surveillance.ru.po      11 Apr 2021 13:04:34 -0000      1.702
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5244,6 +5245,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The HonorLock online exam proctoring program is a surveillance tool that <a "
 "href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-";
 "against-proctoring-surveillance-apps\">tracks students and collects data</a> "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- proprietary.de-diff.html    11 Apr 2021 12:03:14 -0000      1.243
+++ proprietary.de-diff.html    11 Apr 2021 13:04:34 -0000      1.244
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -224,6 +224,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202103100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,29 +293,6 @@
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809121"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202103050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;At least 30 thousand organizations
-    in the United States are newly &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
-    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
-    is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -358,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary.de.po   11 Apr 2021 12:03:14 -0000      1.278
+++ proprietary.de.po   11 Apr 2021 13:04:34 -0000      1.279
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -546,27 +565,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.424
retrieving revision 1.425
diff -u -b -r1.424 -r1.425
--- proprietary.es.po   11 Apr 2021 12:03:14 -0000      1.424
+++ proprietary.es.po   11 Apr 2021 13:04:34 -0000      1.425
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -341,6 +341,25 @@
 msgstr "Añadidos recientes"
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 # | Amazon's monopoly and DRM is <a
 # | 
href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly{+/+}\";>stopping
 # | public libraries from lending e-books and audiobooks</a>. Amazon became
@@ -447,41 +466,6 @@
 "datos personales y (probablemente) obtener beneficio cediéndoselos a "
 "terceros."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions, junto a negocios de publicidad en línea controlados "
-"por Google, Twitter y tres compañías más, están haciendo frente a una <a "
-"href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-";
-"data-privacy-google-twitter.html\">demanda por violar la privacidad de la "
-"gente, al recopilar sus datos de juegos para el móvil y proporcionárselos a 
"
-"otras compañías con fines publicitarios</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"Al menos 30.000 organizaciones estadounidenses han sido recientemente &ldquo;"
-"<a href=\"/philosophy/words-to-avoid.html#Hacker\">«crackeadas»</a>&rdquo; 
a "
-"través de <a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
-"organizations-newly-hacked-via-holes-in-microsofts-email-software/"
-"\">agujeros en el software privativo de mensajería electrónica de Microsoft 
"
-"llamado Microsoft 365</a>. No está claro si hay o no otros agujeros y "
-"vulnerabilidades en el programa, pero la historia y la experiencia nos "
-"enseñan que no será el último desastre ocasionado por programas 
privativos."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -561,3 +545,38 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://";
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions, junto a negocios de publicidad en línea controlados 
"
+#~ "por Google, Twitter y tres compañías más, están haciendo frente a una 
<a "
+#~ "href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-";
+#~ "apps-data-privacy-google-twitter.html\">demanda por violar la privacidad "
+#~ "de la gente, al recopilar sus datos de juegos para el móvil y "
+#~ "proporcionárselos a otras compañías con fines publicitarios</a>."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "Al menos 30.000 organizaciones estadounidenses han sido recientemente "
+#~ "&ldquo;<a href=\"/philosophy/words-to-avoid.html#Hacker\">«crackeadas»</"
+#~ "a>&rdquo; a través de <a href=\"https://krebsonsecurity.com/2021/03/at-";
+#~ "least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-"
+#~ "software/\">agujeros en el software privativo de mensajería electrónica "
+#~ "de Microsoft llamado Microsoft 365</a>. No está claro si hay o no otros "
+#~ "agujeros y vulnerabilidades en el programa, pero la historia y la "
+#~ "experiencia nos enseñan que no será el último desastre ocasionado por "
+#~ "programas privativos."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.467
retrieving revision 1.468
diff -u -b -r1.467 -r1.468
--- proprietary.fr.po   11 Apr 2021 12:03:14 -0000      1.467
+++ proprietary.fr.po   11 Apr 2021 13:04:34 -0000      1.468
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-03-16 22:58+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -338,6 +338,25 @@
 msgstr "Ajouts récents"
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 # | Amazon's monopoly and DRM is <a
 # | 
href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly{+/+}\";>stopping
 # | public libraries from lending e-books and audiobooks</a>. Amazon became
@@ -439,40 +458,6 @@
 "les vendre, mais de récolter vos données personnelles et (peut-être) de "
 "faire leur marge en les vendant à d'autres."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions, ainsi que des entreprises de pub en ligne contrôlées "
-"par Google, Twitter et trois autres sociétés, sont sous le coup d'une <a "
-"href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-";
-"data-privacy-google-twitter.html\">plainte pour non-respect de la vie "
-"privée</a> pour avoir communiqué les données personnelles d'utilisateurs 
de "
-"jeux mobiles à des sociétés tierces, entre autres à des fins 
publicitaires."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"C'est une <a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
-"organizations-newly-hacked-via-holes-in-microsofts-email-software/\">faille "
-"de sécurité dans le serveur de messagerie de Microsoft 365</a> qui a "
-"récemment permis un piratage affectant au moins trente mille organisations "
-"aux États-Unis. On ne sait pas s'il y en a d'autres, mais l'histoire et "
-"l'expérience nous disent que ce n'est pas la première fois qu'un programme "
-"privateur est responsable d'un désastre, et probablement pas la dernière."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -545,3 +530,38 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://";
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions, ainsi que des entreprises de pub en ligne "
+#~ "contrôlées par Google, Twitter et trois autres sociétés, sont sous le "
+#~ "coup d'une <a href=\"https://www.nytimes.com/interactive/2018/09/12/";
+#~ "technology/kids-apps-data-privacy-google-twitter.html\">plainte pour non-"
+#~ "respect de la vie privée</a> pour avoir communiqué les données "
+#~ "personnelles d'utilisateurs de jeux mobiles à des sociétés tierces, 
entre "
+#~ "autres à des fins publicitaires."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "C'est une <a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-";
+#~ "s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">faille de sécurité dans le serveur de messagerie de Microsoft 365</a> 
"
+#~ "qui a récemment permis un piratage affectant au moins trente mille "
+#~ "organisations aux États-Unis. On ne sait pas s'il y en a d'autres, mais "
+#~ "l'histoire et l'expérience nous disent que ce n'est pas la première fois 
"
+#~ "qu'un programme privateur est responsable d'un désastre, et probablement "
+#~ "pas la dernière."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary.it-diff.html    11 Apr 2021 12:03:14 -0000      1.255
+++ proprietary.it-diff.html    11 Apr 2021 13:04:34 -0000      1.256
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -139,16 +139,16 @@
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -223,6 +223,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202103100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,29 +292,6 @@
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809121"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202103050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;At least 30 thousand organizations
-    in the United States are newly &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
-    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
-    is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -357,7 +355,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary.it.po   11 Apr 2021 12:03:14 -0000      1.287
+++ proprietary.it.po   11 Apr 2021 13:04:34 -0000      1.288
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -539,27 +558,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary.ja-diff.html    11 Apr 2021 12:03:14 -0000      1.260
+++ proprietary.ja-diff.html    11 Apr 2021 13:04:34 -0000      1.261
@@ -63,8 +63,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -181,9 +181,9 @@
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -228,6 +228,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202103100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -276,29 +297,6 @@
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809121"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202103050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;At least 30 thousand organizations
-    in the United States are newly &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
-    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
-    is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -362,7 +360,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary.ja.po   11 Apr 2021 12:03:14 -0000      1.271
+++ proprietary.ja.po   11 Apr 2021 13:04:34 -0000      1.272
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -397,27 +416,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary.nl-diff.html    11 Apr 2021 12:03:14 -0000      1.256
+++ proprietary.nl-diff.html    11 Apr 2021 13:04:34 -0000      1.257
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -223,6 +223,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202103100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,29 +292,6 @@
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809121"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202103050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;At least 30 thousand organizations
-    in the United States are newly &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
-    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
-    is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -357,7 +355,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary.nl.po   11 Apr 2021 12:03:14 -0000      1.261
+++ proprietary.nl.po   11 Apr 2021 13:04:34 -0000      1.262
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -442,27 +461,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.pl-diff.html    11 Apr 2021 12:03:14 -0000      1.273
+++ proprietary.pl-diff.html    11 Apr 2021 13:04:35 -0000      1.274
@@ -176,9 +176,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -199,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -222,6 +222,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202103100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -270,29 +291,6 @@
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809121"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202103050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;At least 30 thousand organizations
-    in the United States are newly &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
-    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
-    is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -356,7 +354,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.pl.po   11 Apr 2021 12:03:14 -0000      1.254
+++ proprietary.pl.po   11 Apr 2021 13:04:35 -0000      1.255
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -623,27 +642,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary.pot     11 Apr 2021 12:03:14 -0000      1.251
+++ proprietary.pot     11 Apr 2021 13:04:35 -0000      1.252
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a "
+"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
+"over personal data of Indian protesters and activists to Indian police</a> "
+"which leaded to their arrest. The cops requested the IP address and the "
+"location where a document was created and with those information, they "
+"identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\";>lock
 "
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a "
 
"href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/\";>stopping
 "
 "public libraries from lending e-books and audiobooks</a>. Amazon became "
@@ -336,26 +355,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a "
-"href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html\";>for
 "
-"violating people's privacy by collecting their data from mobile games and "
-"handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/\";>holes
 "
-"in Microsoft's proprietary email software, named Microsoft 365</a>. It is "
-"unclear whether there are other holes and vulnerabilities in the program or "
-"not but history and experience tells us it wouldn't be the last disaster "
-"with proprietary programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.403
retrieving revision 1.404
diff -u -b -r1.403 -r1.404
--- proprietary.pt-br.po        11 Apr 2021 12:03:14 -0000      1.403
+++ proprietary.pt-br.po        11 Apr 2021 13:04:35 -0000      1.404
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-02-07 15:33-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -341,6 +341,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -402,27 +421,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.489
retrieving revision 1.490
diff -u -b -r1.489 -r1.490
--- proprietary.ru.po   11 Apr 2021 12:03:14 -0000      1.489
+++ proprietary.ru.po   11 Apr 2021 13:04:35 -0000      1.490
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -340,6 +340,25 @@
 msgstr "Последние добавления"
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 # | Amazon's monopoly and DRM is <a
 # | 
href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly{+/+}\";>stopping
 # | public libraries from lending e-books and audiobooks</a>. Amazon became
@@ -442,42 +461,6 @@
 "телевизоры и продавать их за деньги, а 
собирать ваши личные данные и "
 "(возможно) с выгодой передавать их другим."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions, вместе с предприятиями по 
рекламе в Интернете, "
-"работающими под управлением Google, Twitter и 
трех других компаний, "
-"предстали перед судом за <a 
href=\"https://www.nytimes.com/";
-"interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"
-"\">нарушение неприкосновенности личной 
жизни людей посредством сбора их "
-"данных из мобильных игр и передачи этих 
данных другим компаниям и "
-"рекламодателям</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"По меньшей мере 30 тысяч организаций в 
Соединенных Штатах недавно &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">взломаны</a>&rdquo; 
с "
-"помощью <a 
href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
-"organizations-newly-hacked-via-holes-in-microsofts-email-software/\">дыр 
в "
-"несвободной почтовой программе Microsoft под 
названием Microsoft 365</a>. "
-"Неясно, есть ли другие дыры и уязвимости в 
этой программе, но история и опыт "
-"говорят нам, что едва ли это последнее 
бедствие, связанное с несвободными "
-"прораммами."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -554,6 +537,41 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://";
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions, вместе с предприятиями по 
рекламе в Интернете, "
+#~ "работающими под управлением Google, Twitter и 
трех других компаний, "
+#~ "предстали перед судом за <a 
href=\"https://www.nytimes.com/";
+#~ "interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
+#~ "html\">нарушение неприкосновенности 
личной жизни людей посредством сбора "
+#~ "их данных из мобильных игр и передачи 
этих данных другим компаниям и "
+#~ "рекламодателям</a>."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "По меньшей мере 30 тысяч организаций в 
Соединенных Штатах недавно &ldquo;"
+#~ "<a 
href=\"/philosophy/words-to-avoid.html#Hacker\">взломаны</a>&rdquo; с "
+#~ "помощью <a 
href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
+#~ 
"organizations-newly-hacked-via-holes-in-microsofts-email-software/\">дыр "
+#~ "в несвободной почтовой программе Microsoft 
под названием Microsoft 365</"
+#~ "a>. Неясно, есть ли другие дыры и 
уязвимости в этой программе, но история "
+#~ "и опыт говорят нам, что едва ли это 
последнее бедствие, связанное с "
+#~ "несвободными прораммами."
+
+#~ msgid ""
 #~ "Researchers at the security firm SentinelOne discovered a <a href="
 #~ "\"https://www.wired.com/story/windows-defender-vulnerability-twelve-years/";
 #~ "\">security flaw in proprietary program Microsoft Windows Defender that "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.tr.po   11 Apr 2021 12:03:14 -0000      1.143
+++ proprietary.tr.po   11 Apr 2021 13:04:35 -0000      1.144
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-03-17 06:40+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -336,6 +336,25 @@
 msgstr "Son eklenenler"
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
@@ -430,40 +449,6 @@
 "karşılığında satmaktan ziyade kişisel verinizi toplamak ve (muhtemelen) 
"
 "çıkar sağlamak için onu başkalarına vermek."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions şirketi Google, Twitter ve diğer üç şirket 
tarafından "
-"yürütülen çevrim içi reklam işletmeleriyle birlikte <a 
href=\"https://www.";
-"nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-"
-"twitter.html\">mobil oyunlarda verilerini toplayarak ve bu verileri diğer "
-"şirketlere/reklamcılara vererek insanların gizliliğini ihlal ettikleri 
için</"
-"a> bir davayla karşı karşıya."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"Birleşmiş Devletler\t'deki en azından 30 bin kuruluş, <a href=\"https://";
-"krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
-"via-holes-in-microsofts-email-software/\">Microsoft'un, Microsoft 365 adlı "
-"özel mülk e-posta yazılımındaki açıklar</a> nedeniyle &ldquo;<a 
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">kırıldılar</a>&rdquo;. Programda "
-"başka açıkların veya zaafların olup olmadığı açık değil, ancak 
tarih ve "
-"deneyim bize bunun özel mülk programların son felaketi olmayacağını 
söylüyor."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -545,6 +530,40 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://";
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions şirketi Google, Twitter ve diğer üç şirket "
+#~ "tarafından yürütülen çevrim içi reklam işletmeleriyle birlikte <a 
href="
+#~ "\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-";
+#~ "data-privacy-google-twitter.html\">mobil oyunlarda verilerini toplayarak "
+#~ "ve bu verileri diğer şirketlere/reklamcılara vererek insanların "
+#~ "gizliliğini ihlal ettikleri için</a> bir davayla karşı karşıya."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "Birleşmiş Devletler\t'deki en azından 30 bin kuruluş, <a 
href=\"https://";
+#~ "krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
+#~ "via-holes-in-microsofts-email-software/\">Microsoft'un, Microsoft 365 "
+#~ "adlı özel mülk e-posta yazılımındaki açıklar</a> nedeniyle 
&ldquo;<a href="
+#~ "\"/philosophy/words-to-avoid.html#Hacker\">kırıldılar</a>&rdquo;. "
+#~ "Programda başka açıkların veya zaafların olup olmadığı açık 
değil, ancak "
+#~ "tarih ve deneyim bize bunun özel mülk programların son felaketi "
+#~ "olmayacağını söylüyor."
+
+#~ msgid ""
 #~ "Researchers at the security firm SentinelOne discovered a <a href="
 #~ "\"https://www.wired.com/story/windows-defender-vulnerability-twelve-years/";
 #~ "\">security flaw in proprietary program Microsoft Windows Defender that "

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.zh-cn.po        11 Apr 2021 12:03:15 -0000      1.180
+++ proprietary.zh-cn.po        11 Apr 2021 13:04:35 -0000      1.181
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2021-03-17 14:45+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -315,6 +315,25 @@
 msgstr "最新添加"
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
@@ -400,37 +419,6 @@
 "看起来这些厂商不是靠生产和销售电视机赚钱,而是靠
收集个人数据进而(可能)把数"
 "据交给其他人而获利。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions 公司,以及由 Google、Twitter 和另外三家å…
¶ä»–运营在线广告"
-"的公司目前面临 <a 
href=\"https://www.nytimes.com/interactive/2018/09/12/";
-"technology/kids-apps-data-privacy-google-twitter.html\">通过在线游戏收集数据"
-"和将数据交给其他公司及广告商而违反隐私权</a> 
的指控。."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"最近,美国最少有 3 万个组织和机构被 &ldquo;<a 
href=\"/philosophy/words-to-"
-"avoid.html#Hacker\">破坏</a>&rdquo;,该破坏通过 <a href=\"https://";
-"krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
-"via-holes-in-microsofts-email-software/\">微软的专有电子邮件软件,即
 "
-"Microsoft 365</a> 
进行。虽然我们并不知道该专有程序是否还有å…
¶ä»–的漏洞和弱点,"
-"但是历史和经验告诉我们这次不会是专有软件的最后恶果。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -508,6 +496,36 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://";
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions 公司,以及由 Google、Twitter 和另外三家å…
¶ä»–运营在线广"
+#~ "告的公司目前面临 <a 
href=\"https://www.nytimes.com/interactive/2018/09/12/";
+#~ 
"technology/kids-apps-data-privacy-google-twitter.html\">通过在线游戏收集数"
+#~ "据和将数据交给其他公司及广告商而违反隐私权</a> 
的指控。."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-";
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "最近,美国最少有 3 万个组织和机构被 &ldquo;<a 
href=\"/philosophy/words-to-"
+#~ "avoid.html#Hacker\">破坏</a>&rdquo;,该破坏通过 <a href=\"https://";
+#~ "krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
+#~ 
"via-holes-in-microsofts-email-software/\">微软的专有电子邮件软件,即
 "
+#~ "Microsoft 365</a> 
进行。虽然我们并不知道该专有程序是否还有å…
¶ä»–的漏洞和弱"
+#~ 
"点,但是历史和经验告诉我们这次不会是专有软件的最后恶果。"
+
+#~ msgid ""
 #~ "Researchers at the security firm SentinelOne discovered a <a href="
 #~ "\"https://www.wired.com/story/windows-defender-vulnerability-twelve-years/";
 #~ "\">security flaw in proprietary program Microsoft Windows Defender that "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.zh-tw-diff.html 11 Apr 2021 12:03:15 -0000      1.236
+++ proprietary.zh-tw-diff.html 11 Apr 2021 13:04:35 -0000      1.237
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -224,6 +224,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    address and the location where a document was created and with those
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW is trying to &lt;a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back door.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202103100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,29 +293,6 @@
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809121"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202103050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;At least 30 thousand organizations
-    in the United States are newly &ldquo;&lt;a
-    href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
-    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
-    is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;/div&gt;</em></ins></span>
@@ -358,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 12:03:15 $
+$Date: 2021/04/11 13:04:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary.zh-tw.po        11 Apr 2021 12:03:15 -0000      1.241
+++ proprietary.zh-tw.po        11 Apr 2021 13:04:36 -0000      1.242
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,25 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 "technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
 "libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -512,27 +531,6 @@
 "over them to others for benefit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes.";
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>&rdquo; via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-";
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.371
retrieving revision 1.372
diff -u -b -r1.371 -r1.372
--- pt-br.po    11 Apr 2021 12:03:15 -0000      1.371
+++ pt-br.po    11 Apr 2021 13:04:36 -0000      1.372
@@ -4445,6 +4445,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -8282,6 +8292,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.626
retrieving revision 1.627
diff -u -b -r1.626 -r1.627
--- ru.po       11 Apr 2021 12:03:15 -0000      1.626
+++ ru.po       11 Apr 2021 13:04:37 -0000      1.627
@@ -5375,6 +5375,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -9982,6 +9992,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- tr.po       11 Apr 2021 12:03:16 -0000      1.163
+++ tr.po       11 Apr 2021 13:04:37 -0000      1.164
@@ -3947,6 +3947,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Google Nest <a href=\"https://blog.google/products/google-nest/";
@@ -7408,6 +7418,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- zh-cn.po    11 Apr 2021 12:03:16 -0000      1.164
+++ zh-cn.po    11 Apr 2021 13:04:37 -0000      1.165
@@ -3891,6 +3891,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "Google Nest <a href=\"https://blog.google/products/google-nest/";
@@ -7156,6 +7166,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- zh-tw.po    11 Apr 2021 12:03:16 -0000      1.300
+++ zh-tw.po    11 Apr 2021 13:04:37 -0000      1.301
@@ -3820,6 +3820,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google Nest <a href=\"https://blog.google/products/google-nest/partnership-";
 "adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
 "software update to its speaker devices using their back door <a href="
@@ -6944,6 +6954,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-";
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
 "accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
 "door that can make it cease to function</a>."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]