www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 15 Apr 2021 10:32:31 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/04/15 10:32:31

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po pt-br.po ru.po 
                         tr.po zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.428&r2=1.429
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.528&r2=1.529
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.623&r2=1.624
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.400&r2=1.401
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.704&r2=1.705
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.630&r2=1.631
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.302&r2=1.303

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- de.po       11 Apr 2021 15:04:17 -0000      1.302
+++ de.po       15 Apr 2021 14:32:13 -0000      1.303
@@ -13310,6 +13310,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
 msgstr "Inhaltsverzeichnis"

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.428
retrieving revision 1.429
diff -u -b -r1.428 -r1.429
--- es.po       12 Apr 2021 10:33:22 -0000      1.428
+++ es.po       15 Apr 2021 14:32:13 -0000      1.429
@@ -14021,6 +14021,13 @@
 "propia página: <a href=\"/proprietary/proprietary-tethers.html"
 "\">Subordinación a un servidor en el software privativo</a>."
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 # | [-<a href=\"#TOC\">Table-]{+Table+} of [-contents</a>-] {+Contents+}
 #, fuzzy

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.528
retrieving revision 1.529
diff -u -b -r1.528 -r1.529
--- fr.po       12 Apr 2021 09:50:40 -0000      1.528
+++ fr.po       15 Apr 2021 14:32:14 -0000      1.529
@@ -11872,6 +11872,13 @@
 "ont une page dédiée : <a 
href=\"/proprietary/proprietary-tethers.html#about-"
 "page\">Dépendance privatrice d'un serveur</a>."
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
 msgstr "Table des matières"

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- it.po       11 Apr 2021 15:04:17 -0000      1.302
+++ it.po       15 Apr 2021 14:32:15 -0000      1.303
@@ -12388,6 +12388,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
 msgstr "Indice"

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- ja.po       11 Apr 2021 15:04:17 -0000      1.310
+++ ja.po       15 Apr 2021 14:32:15 -0000      1.311
@@ -9830,6 +9830,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
 msgstr "もくじ"

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- nl.po       11 Apr 2021 15:04:18 -0000      1.303
+++ nl.po       15 Apr 2021 14:32:15 -0000      1.304
@@ -9119,6 +9119,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- pl.po       11 Apr 2021 15:04:18 -0000      1.302
+++ pl.po       15 Apr 2021 14:32:16 -0000      1.303
@@ -8619,6 +8619,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- pot 11 Apr 2021 15:04:18 -0000      1.301
+++ pot 15 Apr 2021 14:32:17 -0000      1.302
@@ -7900,6 +7900,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
 msgstr ""

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary-surveillance.de-diff.html       11 Apr 2021 15:04:18 -0000      
1.178
+++ proprietary-surveillance.de-diff.html       15 Apr 2021 14:32:18 -0000      
1.179
@@ -117,7 +117,9 @@
 server are snoopers by nature.  We do not list them here because they
 have their own page: &lt;a
 href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
-Tethers&lt;/a&gt;.&lt;/p&gt;
+    Tethers&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;There is a similar site named &lt;a 
href="https://spyware.neocities.org"&gt;Spyware Watchdog&lt;/a&gt; that 
classifies spyware programs, so that users can be more aware that they are 
installing spyware.&lt;/p&gt;
 
 &lt;div class="important" style="clear: both"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -246,24 +248,21 @@
 
 <span class="inserted"><ins><em>&lt;h4</em></ins></span> 
id="LatestAdditions"&gt;Latest <span 
class="removed"><del><strong>additions&lt;/h3&gt;
 
-&lt;p&gt;Latest additions</strong></del></span> <span 
class="inserted"><ins><em>additions&lt;/h4&gt;
+&lt;p&gt;Latest</strong></del></span> <span 
class="inserted"><ins><em>additions&lt;/h4&gt;
 
-&lt;p&gt;Entries in each category</em></ins></span> are <span 
class="removed"><del><strong>found</strong></del></span> <span 
class="inserted"><ins><em>in reverse chronological order, 
based</em></ins></span>
-on <span class="removed"><del><strong>top under each category.&lt;/p&gt;
+&lt;p&gt;Entries in each category are in reverse chronological order, based
+on the dates of publication of linked articles.
+The latest</em></ins></span> additions are <span 
class="removed"><del><strong>found</strong></del></span> <span 
class="inserted"><ins><em>listed</em></ins></span> on <span 
class="removed"><del><strong>top under each category.&lt;/p&gt;
 
 &lt;!-- #OSSpyware --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>the dates of publication of linked articles.
-The latest additions are listed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3</strong></del></span> <span class="inserted"><ins><em>the &lt;a
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>the &lt;a
 href="/proprietary/proprietary.html#latest"&gt;main page&lt;/a&gt; of the
-Malware section.&lt;/p&gt;
+Malware section.&lt;/p&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3</em></ins></span> id="OSSpyware"&gt;Spyware in <span 
class="removed"><del><strong>Operating Systems&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Laptops and 
Desktops&lt;/h3&gt;</em></ins></span>
+  &lt;h3 id="OSSpyware"&gt;Spyware in <span 
class="removed"><del><strong>Operating Systems&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>Laptops and 
Desktops&lt;/h3&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#OSSpyware"&gt;#OSSpyware&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -646,10 +645,11 @@
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
-    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>Windows installs.  Note that the specific
+    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
+    worked</strong></del></span> <span class="inserted"><ins><em>specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>various ways to 
prevent that,</strong></del></span> <span class="inserted"><ins><em>its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -672,31 +672,49 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The proprietary program Clubhouse
-    is malware and a privacy disaster. Clubhouse &lt;a
+    is malware</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for the snooping</strong></del></span> <span 
class="inserted"><ins><em>a privacy disaster. Clubhouse &lt;a
     
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
     people's personal data such as recordings of people's
     conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
-    which shows a bad security part of the issue.&lt;/p&gt;
+    which shows a bad security part</em></ins></span> of <span 
class="removed"><del><strong>these apps.&lt;/p&gt;
 
-    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
-    in plaintext, and Agora (the company behind the app) would likely
-    have access to users' raw audio, potentially providing access to
-    the Chinese government.&lt;/p&gt;
+  &lt;p&gt;On</strong></del></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>issue.&lt;/p&gt;
 
-    &lt;p&gt;Even with good security of data transmission, collecting personal
-    data of people is wrong and a violation of people's privacy 
rights.&lt;/p&gt;
+    &lt;p&gt;A user's unique Clubhouse ID number</em></ins></span> and
+    <span class="removed"><del><strong>therefore shares</strong></del></span> 
<span class="inserted"><ins><em>chatroom ID are transmitted</em></ins></span>
+    in <span class="inserted"><ins><em>plaintext, and Agora (the company 
behind</em></ins></span> the <span class="removed"><del><strong>responsibility 
for</strong></del></span> <span class="inserted"><ins><em>app) would likely
+    have access to users' raw audio, potentially providing access 
to</em></ins></span>
+    the <span class="removed"><del><strong>injustice</strong></del></span> 
<span class="inserted"><ins><em>Chinese government.&lt;/p&gt;
+
+    &lt;p&gt;Even with good security</em></ins></span> of <span 
class="removed"><del><strong>their
+    being nonfree. It also distributes its own nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done</strong></del></span> <span 
class="inserted"><ins><em>data transmission, collecting personal
+    data of people is wrong and</em></ins></span> a <span 
class="removed"><del><strong>better job</strong></del></span> <span 
class="inserted"><ins><em>violation</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
+    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>people's privacy rights.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
+    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's 
subsidiaries)</em></ins></span> is <span class="removed"><del><strong>no 
systematic way for Google, or Android
+    users,</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
+    its users</em></ins></span> to <span class="removed"><del><strong>inspect 
executable proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>hand over sensitive personal 
data&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>see what 
they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these 
apps,</strong></del></span> <span class="inserted"><ins><em>its parent
+    company. This increases Facebook's power over users,</em></ins></span> and 
<span class="removed"><del><strong>study the
+    source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job</strong></del></span> <span 
class="inserted"><ins><em>further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
+    &lt;p&gt;Instead</em></ins></span> of <span 
class="removed"><del><strong>this, it could more or</strong></del></span> <span 
class="inserted"><ins><em>WhatsApp you can use &lt;a
     href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
     free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
@@ -710,10 +728,15 @@
     especially nasty malware, helping companies snoop on users as well
     as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says that Biden's app has a less manipulative overall
+    &lt;p&gt;The article says that Biden's app has a</em></ins></span> less
+    <span class="removed"><del><strong>prevent</strong></del></span> <span 
class="inserted"><ins><em>manipulative overall
     approach, but that does not tell us whether it has functionalities we
-    consider malicious, such as sending data the user has not explicitly
-    asked to send.&lt;/p&gt;
+    consider malicious,</em></ins></span> such <span 
class="removed"><del><strong>snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>as sending data</em></ins></span> the <span 
class="removed"><del><strong>app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>user has not 
explicitly
+    asked</em></ins></span> to <span class="removed"><del><strong>outsmart the 
checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809121"&gt;
@@ -723,29 +746,36 @@
     by Google, Twitter and three other companies are facing a lawsuit &lt;a
     
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
     violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+    and handing over these data</em></ins></span> to <span 
class="removed"><del><strong>protect us. We must demand 
release</strong></del></span> <span class="inserted"><ins><em>other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension of monitoring
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+    proprietary software</em></ins></span> to <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the
+    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
 
-  &lt;li id="M201510050"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
+    them to turn</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>phones on</em></ins></span> and <span 
class="removed"><del><strong>security
+    of 283 Android VPN apps concluded that &ldquo;in spite 
of</strong></del></span> <span class="inserted"><ins><em>off, listen 
to</em></ins></span> the
+    <span class="removed"><del><strong>promises for privacy, 
security,</strong></del></span> <span class="inserted"><ins><em>microphone,
     retrieve geo-location data from the GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed to disguise itself
+    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by</strong></del></span> <span 
class="inserted"><ins><em>web browsing history, and
+    read</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is 
designed</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -755,12 +785,21 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
+    Android,</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there</em></ins></span> 
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps from
+    the research paper</strong></del></span> <span 
class="inserted"><ins><em>not much
+    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of
+    <span class="removed"><del><strong>users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as 
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
@@ -768,9 +807,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>Appflood,
+      meant</strong></del></span> <span class="inserted"><ins><em>users cannot 
stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
+    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -786,7 +826,11 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook &lt;a
     
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
+    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the 
<span class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning</strong></del></span> <span 
class="inserted"><ins><em>device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -797,17 +841,31 @@
     made a practice of surreptitiously activating the Siri software to &lt;a
     
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
-    This was not just occasional, it was systematic practice.&lt;/p&gt;
+    This was not just occasional,</em></ins></span> it <span 
class="inserted"><ins><em>was systematic practice.&lt;/p&gt;
 
     &lt;p&gt;His job was to listen to these recordings, in a group that made
-    transcripts of them. He does not believes that Apple has ceased this
+    transcripts of them. He does not believes that Apple</em></ins></span> has 
<span class="removed"><del><strong>full</strong></del></span> <span 
class="inserted"><ins><em>ceased this
     practice.&lt;/p&gt;
 
     &lt;p&gt;The only reliable way to prevent this is, for the program that
-    controls access to the microphone to decide when the user has
-    &ldquo;activated&rdquo; any service, to be free software, and the
-    operating system under it free as well. This way, users could make
-    sure Apple can't listen to them.&lt;/p&gt;
+    controls</em></ins></span> access to
+      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span 
class="inserted"><ins><em>microphone</em></ins></span> to <span 
class="removed"><del><strong>read logs
+      for other apps</strong></del></span> <span 
class="inserted"><ins><em>decide when the user has
+    &ldquo;activated&rdquo; any service, to be free 
software,</em></ins></span> and <span class="removed"><del><strong>also 
core</strong></del></span> <span class="inserted"><ins><em>the
+    operating</em></ins></span> system <span 
class="removed"><del><strong>logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>under</em></ins></span> it <span 
class="removed"><del><strong>stores detailed logs
+      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>free as well. This way, users could make
+    sure Apple can't listen</em></ins></span> to <span 
class="removed"><del><strong>the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910131"&gt;
@@ -815,90 +873,134 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Safari occasionally &lt;a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    sends browsing data from Apple devices in China</em></ins></span> to the
+      <span class="removed"><del><strong>users. The stated purpose of the JS 
injection is</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed</strong></del></span> <span class="inserted"><ins><em>check 
URLs</em></ins></span> that <span class="inserted"><ins><em>possibly correspond 
to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites of political opponents. By linking the requests
+    with</em></ins></span> the <span class="removed"><del><strong>non-premium 
version</strong></del></span> <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list most certainly
+    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the 
<span class="removed"><del><strong>app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  &lt;li id="M201905280"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    &lt;p&gt;In spite</em></ins></span> of <span 
class="removed"><del><strong>the top-ranked gratis
+  proprietary Android</strong></del></span> <span 
class="inserted"><ins><em>Apple's supposed commitment to
+    privacy, iPhone</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>contain trackers that are busy at night &lt;a
     
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
-    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+    sending users' personal information to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article <span class="removed"><del><strong>confusingly 
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions 
specific examples: Microsoft OneDrive,
     Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
-    trackers. Some of these send personally identifying data such as phone
+    and DoorDash. But it is likely that most nonfree</em></ins></span> apps 
<span class="inserted"><ins><em>contain
+    trackers. Some of these send personally identifying data 
such</em></ins></span> as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    delivery address (in the case</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
+    is collected by</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>company, 
there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that</strong></del></span> <span class="inserted"><ins><em>no telling what 
it</em></ins></span> will <span class="removed"><del><strong>fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be 
spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702150"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots</em></ins></span> of <span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    them from there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    &lt;p&gt;The iMessage</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>on iThings</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number</em></ins></span> that <span 
class="removed"><del><strong>install</strong></del></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
-    and videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>Conditions&rdquo; that spell out
+what</strong></del></span> <span 
class="inserted"><ins><em>videos</em></ins></span> they <span 
class="removed"><del><strong>are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span class="inserted"><ins><em>make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span class="removed"><del><strong>honestly 
identify the information it collects</strong></del></span> <span 
class="inserted"><ins><em>video you
+    take, and keeps them up to date</em></ins></span> on <span 
class="removed"><del><strong>users, instead
+of hiding it in an obscurely</strong></del></span> <span 
class="inserted"><ins><em>all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
@@ -1147,9 +1249,9 @@
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
     honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    hiding it in an obscurely</em></ins></span> worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    &lt;p&gt;However, to <span class="removed"><del><strong>truly protect 
people's privacy, we must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1719,10 +1821,10 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on 
the</em></ins></span> contrary, it
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the <span class="removed"><del><strong>snooping</strong></del></span> 
<span class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
@@ -1781,39 +1883,23 @@
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>these apps.&lt;/p&gt;
-
-  &lt;p&gt;On</strong></del></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps, and
-    therefore shares in</strong></del></span> <span 
class="inserted"><ins><em>audio files users listen to
-    along with</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses that this was done without</em></ins></span> the 
<span class="removed"><del><strong>injustice</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
-    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>their
-    being nonfree.</strong></del></span> <span class="inserted"><ins><em>the 
app said that users gave consent for this,
-    would that make it acceptable? No way!</em></ins></span> It <span 
class="removed"><del><strong>also distributes its own nonfree apps, such as
-    Google
-    Play,</strong></del></span> <span class="inserted"><ins><em>should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
 
-  &lt;p&gt;Could Google have done a better job</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
-    cheating?  There is no systematic way for Google, or</strong></del></span> 
Android
-    <span class="removed"><del><strong>users, to inspect executable 
proprietary</strong></del></span> apps <span class="inserted"><ins><em>can 
collude</em></ins></span>
-    to <span class="removed"><del><strong>see what they
-    do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand the source code for these apps, and study the
-    source code somehow</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to 
<span class="removed"><del><strong>determine whether they mistreat users in
-    various ways. If it did a good job</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens</em></ins></span> of <span 
class="removed"><del><strong>this,</strong></del></span> <span 
class="inserted"><ins><em>thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
@@ -1821,21 +1907,16 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that</em></ins></span> it <span 
class="removed"><del><strong>could more or less
-    prevent such snooping, except</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
     on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets</em></ins></span> when 
<span class="inserted"><ins><em>they use
+    about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However,</em></ins></span> 
the app <span class="removed"><del><strong>developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release</strong></del></span>
-    <span class="inserted"><ins><em>remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</em></ins></span> of <span 
class="removed"><del><strong>source code</strong></del></span> <span 
class="inserted"><ins><em>spyware is
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1844,7 +1925,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1852,18 +1933,16 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+  &lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -1872,15 +1951,11 @@
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
-    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
-    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
-    users:&lt;/p&gt;
-
-  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;</em></ins></span>
+    &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
@@ -1902,97 +1977,52 @@
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display ads. Uses
-      roughly <span class="removed"><del><strong>5</strong></del></span> <span 
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it 
redirects the user's
+      roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
<span class="removed"><del><strong>5</strong></del></span>
-      <span class="inserted"><ins><em>five</em></ins></span> tracking 
libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking <span class="inserted"><ins><em>the user</em></ins></span> and 
<span class="removed"><del><strong>display</strong></del></span> <span 
class="inserted"><ins><em>displaying</em></ins></span> ads.&lt;/dd&gt;
-    &lt;/dl&gt;
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>other companies from 
getting</strong></del></span> <span class="inserted"><ins><em>also uses roughly
+      five tracking libraries. Developers of</em></ins></span> this <span 
class="removed"><del><strong>personal information in</strong></del></span> 
<span class="inserted"><ins><em>app have confirmed that</em></ins></span>
+      the <span class="removed"><del><strong>first
+place!&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>non-premium version</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
+      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>location tracking,</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+  &lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
     
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+  &lt;li id="M201606050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's new Magic Photo</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
+    and suggests</em></ins></span> you <span class="removed"><del><strong>must
+    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>circulate</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>picture you take according to who</em></ins></span> is
+    <span class="removed"><del><strong>yet another 
example</strong></del></span>
     <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>require 
online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
-what they</strong></del></span> <span 
class="inserted"><ins><em>pictures</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>likely to be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
-    even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
     when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -4440,7 +4470,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:18 $
+$Date: 2021/04/15 14:32:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- proprietary-surveillance.de.po      11 Apr 2021 15:04:18 -0000      1.388
+++ proprietary-surveillance.de.po      15 Apr 2021 14:32:20 -0000      1.389
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -153,6 +153,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 # | If you know of an example that ought to be in this page but isn't here,
 # | please write to <a

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary-surveillance.es.po      12 Apr 2021 10:33:23 -0000      1.180
+++ proprietary-surveillance.es.po      15 Apr 2021 14:32:22 -0000      1.181
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: 2021-04-12 12:06+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 14:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -126,6 +127,13 @@
 "propia página: <a href=\"/proprietary/proprietary-tethers.html#about-page"
 "\">Subordinación a un servidor en el software privativo</a>."
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.623
retrieving revision 1.624
diff -u -b -r1.623 -r1.624
--- proprietary-surveillance.fr.po      12 Apr 2021 09:50:40 -0000      1.623
+++ proprietary-surveillance.fr.po      15 Apr 2021 14:32:22 -0000      1.624
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: 2021-04-12 11:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 14:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -121,6 +122,13 @@
 "ont une page dédiée : <a 
href=\"/proprietary/proprietary-tethers.html#about-"
 "page\">Dépendance privatrice d'un serveur</a>."
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary-surveillance.it-diff.html       11 Apr 2021 15:04:18 -0000      
1.244
+++ proprietary-surveillance.it-diff.html       15 Apr 2021 14:32:25 -0000      
1.245
@@ -117,7 +117,9 @@
 server are snoopers by nature.  We do not list them here because they
 have their own page: &lt;a
 href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
-Tethers&lt;/a&gt;.&lt;/p&gt;
+    Tethers&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;There is a similar site named &lt;a 
href="https://spyware.neocities.org"&gt;Spyware Watchdog&lt;/a&gt; that 
classifies spyware programs, so that users can be more aware that they are 
installing spyware.&lt;/p&gt;
 
 &lt;div class="important" style="clear: both"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -433,33 +435,30 @@
   turns off its Bing search and Cortana features, and activates the
   privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
-
-    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>uses Windows 10's &ldquo;privacy policy&rdquo; to 
overtly impose a
-  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
-  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
-  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Thus, Windows is overt malware in regard to surveillance,
-  as in other issues.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;
+  Microsoft uses</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
 
-  &lt;p&gt;We can suppose Microsoft look</strong></del></span> <span 
class="inserted"><ins><em>looks</em></ins></span> at users' files for the US 
government
-    on demand, though the &ldquo;privacy policy&rdquo; does not <span 
class="removed"><del><strong>explicit</strong></del></span> <span 
class="inserted"><ins><em>explicitly</em></ins></span>
+    &lt;p&gt;We can suppose Microsoft looks at users' files for the US 
government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
     say so. Will it look at users' files for the Chinese government
     on demand?&lt;/p&gt;
-  <span class="inserted"><ins><em>&lt;/li&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201506170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
+    &lt;p&gt;Microsoft uses</em></ins></span> Windows 10's &ldquo;privacy 
policy&rdquo;
     to overtly impose a &ldquo;right&rdquo; to look at
-    users' files at any time. Windows 10 full disk encryption &lt;a
-    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+    users' files at any time. Windows 10 full disk encryption &lt;a <span 
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</em></ins></span>
     gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Thus, Windows is overt malware in regard to surveillance, as in
-    other issues.&lt;/p&gt;</em></ins></span>
+    other issues.&lt;/p&gt;
+
+  <span class="removed"><del><strong>&lt;p&gt;We can suppose Microsoft look at 
users' files for the US government on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on 
demand?&lt;/p&gt;</strong></del></span>
 
     &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables
     other companies to track the browsing of each specific user.&lt;/p&gt;
@@ -684,201 +683,237 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
+  &lt;p&gt;Pairs of Android apps can collude to transmit 
users'</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
-    people's personal data such as recordings</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude</strong></del></span> 
<span class="inserted"><ins><em>people's
+    people's</em></ins></span> personal data <span 
class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span> <span class="inserted"><ins><em>such as 
recordings</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>people's
     conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
-    which shows a bad security part of the issue.&lt;/p&gt;
+    which shows a bad security part</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>issue.&lt;/p&gt;
 
     &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
-    in plaintext, and Agora (the company behind the app) would likely
-    have access</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> users' <span 
class="inserted"><ins><em>raw audio, potentially providing access to
-    the Chinese government.&lt;/p&gt;
+    in plaintext, and Agora (the company behind</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even with good security of data transmission, 
collecting</em></ins></span> personal
-    data <span class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>people is wrong and a violation</em></ins></span> of 
<span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's privacy rights.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app) would likely
+    have access to users' raw audio, potentially providing access 
to</em></ins></span>
+    the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government.&lt;/p&gt;
+
+    &lt;p&gt;Even with good security</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>data transmission, collecting personal
+    data of people</em></ins></span> is <span class="removed"><del><strong>not 
enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> and <span 
class="removed"><del><strong>honestly identify the information it collects on 
users, instead</strong></del></span> <span class="inserted"><ins><em>a 
violation</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect</strong></del></span> people's <span 
class="removed"><del><strong>privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>privacy 
rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>users 
that install the app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries) 
is</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>2021, WhatsApp (one</em></ins></span> of <span 
class="inserted"><ins><em>Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its</em></ins></span> users <span class="inserted"><ins><em>to hand over 
sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    its users</em></ins></span> to <span 
class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span class="inserted"><ins><em>hand over 
sensitive personal data&lt;/a&gt; to its parent
+    company.</em></ins></span> This <span class="removed"><del><strong>is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>increases Facebook's power over users, and further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, 
which</em></ins></span> is
-    <span class="inserted"><ins><em>free software and will</em></ins></span> 
not <span class="removed"><del><strong>enough
-to legitimize actions</strong></del></span> <span 
class="inserted"><ins><em>collect your data.&lt;/p&gt;
+    &lt;p&gt;Instead</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with</strong></del></span> <span 
class="inserted"><ins><em>WhatsApp you can use &lt;a
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which 
is</em></ins></span>
+    free <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software and will not collect your 
data.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202006260"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202006260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most apps are malware, but
-    Trump's campaign app,</em></ins></span> like <span 
class="removed"><del><strong>this.  At this point, most</strong></del></span> 
<span class="inserted"><ins><em>Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects</strong></del></span> <span 
class="inserted"><ins><em>as well
-    as snooping</em></ins></span> on <span class="removed"><del><strong>users, 
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>them 
itself&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most</em></ins></span> apps <span class="inserted"><ins><em>are 
malware, but
+    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The article says that Biden's app has a less manipulative overall
-    approach, but that does not tell us whether</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-&lt;p&gt;However, to truly protect people's privacy,</strong></del></span> 
<span class="inserted"><ins><em>has functionalities</em></ins></span> we <span 
class="removed"><del><strong>must prevent Google</strong></del></span>
-    <span class="inserted"><ins><em>consider malicious, such as sending data 
the user has not explicitly
-    asked to send.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The article <span 
class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>says that Biden's app has a less manipulative overall
+    approach, but that does</em></ins></span> not <span 
class="removed"><del><strong>have described these apps</strong></del></span> 
<span class="inserted"><ins><em>tell us whether it has functionalities we
+    consider malicious, such</em></ins></span> as
+  <span class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they 
are</strong></del></span> <span class="inserted"><ins><em>sending data the user 
has</em></ins></span> not <span class="removed"><del><strong>free software.  
The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;li id="M201809121"&gt;
+  &lt;p&gt;The article takes for granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>explicitly
+    asked</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809121"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter</em></ins></span> and <span 
class="inserted"><ins><em>three</em></ins></span> other companies <span 
class="removed"><del><strong>from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span> <span 
class="inserted"><ins><em>are facing a lawsuit</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
+    by Google, Twitter</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when 
they</strong></del></span> <span class="inserted"><ins><em>three other 
companies</em></ins></span> are <span class="removed"><del><strong>sold.
+      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>facing a lawsuit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>data from mobile games</em></ins></span>
-    and <span class="removed"><del><strong>location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>handing over these data</em></ins></span> to <span 
class="removed"><del><strong>completely stop the tracking.  This is
-    yet another example</strong></del></span> <span 
class="inserted"><ins><em>other companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+    violating people's privacy by collecting their data from mobile games
+    and handing over these</em></ins></span> data to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>nonfree</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary</em></ins></span> software <span 
class="removed"><del><strong>pretending</strong></del></span> to <span 
class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnMobiles</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;According</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
-    smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
+    smartphones&lt;/a&gt; by sending hidden text messages</em></ins></span> 
which <span class="removed"><del><strong>would mean no way to use it without 
having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>enable
+    them</em></ins></span> to <span class="removed"><del><strong>tell 
whether</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>and off, listen</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span> <span class="inserted"><ins><em>the 
microphone,
+    retrieve geo-location data</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>off, 
listen</em></ins></span> to the <span class="removed"><del><strong>app's 
functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>web browsing history, and
+    read</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>contact 
list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
+    from investigation.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201311120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android, and BlackBerry&lt;/a&gt;.  While there</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>not much
-    detail here, it seems</em></ins></span> that <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>universal back 
door</em></ins></span> that <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>we know nearly all portable
-    phones have. It may involve exploiting various bugs.  
There</em></ins></span> are
-  <span class="removed"><del><strong>just as wrong as any other 
snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>most popular iOS 
apps</strong></del></span> <span class="inserted"><ins><em>universal back door 
that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+  &lt;li id="M201307000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Portable</em></ins></span> phones <span 
class="removed"><del><strong>modify Android to</strong></del></span> <span 
class="inserted"><ins><em>with GPS</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will</em></ins></span> send <span class="removed"><del><strong>personal 
data</strong></del></span> <span class="inserted"><ins><em>their GPS location 
on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones</em></ins></span>
-    to <span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send</em></ins></span> their <span class="inserted"><ins><em>GPS 
location on remote command, and</em></ins></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's 
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require</em></ins></span> 
all <span class="removed"><del><strong>the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareIniThings"&gt;iThings&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareIniThings"&gt;iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202009183"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span>
+    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops</em></ins></span>
-    on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>Instagram&lt;/a&gt; users</em></ins></span> by 
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span 
class="inserted"><ins><em>Instagram&lt;/a&gt; users by surreptitously turning 
on the device's
+    &lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -886,101 +921,134 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice</em></ins></span> of <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>surreptitiously activating the Siri 
software</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
+    made</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>practice of surreptitiously activating the Siri 
software</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
-    &lt;p&gt;His job was to listen to these recordings, in</em></ins></span> a 
<span class="removed"><del><strong>server every phone 
number</strong></del></span> <span class="inserted"><ins><em>group that made
-    transcripts of them. He does not believes that Apple has ceased this
-    practice.&lt;/p&gt;
-
-    &lt;p&gt;The only reliable way to prevent this is, for the 
program</em></ins></span> that
-    <span class="inserted"><ins><em>controls access to the microphone to 
decide when</em></ins></span> the user <span class="removed"><del><strong>types 
into it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>has
-    &ldquo;activated&rdquo; any service, to be free software, 
and</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot</strong></del></span>
-    <span class="inserted"><ins><em>operating system under it free as well. 
This way, users could</em></ins></span> make <span 
class="removed"><del><strong>an</strong></del></span>
-    <span class="inserted"><ins><em>sure</em></ins></span> Apple <span 
class="removed"><del><strong>ID</strong></del></span> <span 
class="inserted"><ins><em>can't listen to them.&lt;/p&gt;
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He 
does not believes that Apple has ceased</em></ins></span> this
+    <span class="inserted"><ins><em>practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is, 
for the program that
+    controls access</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>the 
microphone</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access</strong></del></span> <span class="inserted"><ins><em>decide 
when the user has
+    &ldquo;activated&rdquo;</em></ins></span> any <span 
class="removed"><del><strong>of them through</strong></del></span> <span 
class="inserted"><ins><em>service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
the <span class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
-    Browsing service&lt;/a&gt;,</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>check URLs that possibly correspond to
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> <span 
class="inserted"><ins><em>China to</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="inserted"><ins><em>Chinese 
government, its Safe Browsing black list</em></ins></span> most <span 
class="removed"><del><strong>popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>certainly
-    contains the websites</em></ins></span> of <span 
class="inserted"><ins><em>political opponents. By linking the requests
+    with</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>Chinese government, 
its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering</em></ins></span> 
their <span class="removed"><del><strong>users with third 
parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>track users, which is</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that 
are busy at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6, but</strong></del></span> <span 
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
     Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
+    and DoorDash. But</em></ins></span> it is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    is collected by the company, there is no telling what it 
will</em></ins></span> be
+      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of</strong></del></span> iOS <span 
class="removed"><del><strong>seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="inserted"><ins><em>obvious way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>turn the phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>use it without having your fingerprints taken. Users 
would have
+    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read the contact list. This 
malware</strong></del></span> <span 
class="inserted"><ins><em>phone</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
@@ -988,71 +1056,112 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
+    lots of personal data</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself</strong></del></span> 
<span class="inserted"><ins><em>Apple's servers&lt;/a&gt;.  Big Brother can get
+    them</em></ins></span> from <span 
class="removed"><del><strong>investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    &lt;p&gt;The iMessage app on iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data that their transmission 
is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</em></ins></span>
+    a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested by the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> <span 
class="inserted"><ins><em>server every</em></ins></span> phone
+      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>number that</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that
+      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user types into 
it&lt;/a&gt;;</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
-    and videos they make.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>videos they 
make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. <span 
class="removed"><del><strong>[...]</strong></del></span> <span 
class="inserted"><ins><em>[&hellip;]</em></ins></span> 
&lt;/p&gt;&lt;/blockquote&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command</strong></del></span> <span 
class="inserted"><ins><em>video you
+    take,</em></ins></span> and <span class="removed"><del><strong>users 
cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>keeps them 
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span class="removed"><del><strong>to 
restrict</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span>
+    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer,</strong></del></span> 
<span class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; 
means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
-    surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
-    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    iCloud&lt;/a&gt;,</em></ins></span> but <span 
class="inserted"><ins><em>it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>does</strong></del></span> <span 
class="inserted"><ins><em>still counts as a</em></ins></span>
+    surveillance
+      <span class="removed"><del><strong>too:</strong></del></span> <span 
class="inserted"><ins><em>functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security</em></ins></span> to get <span class="removed"><del><strong>the 
user's list</strong></del></span> <span class="inserted"><ins><em>at them, but 
NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201409220"&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some</em></ins></span> data <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+  &lt;li id="M201407230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -1093,69 +1202,40 @@
   &lt;li id="M201210170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;There is also</em></ins></span> a feature for web sites to track 
users, which is &lt;a
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+  &lt;li id="M201204280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
-    to <span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202012070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Baidu apps were</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
-    caught collecting sensitive personal data&lt;/a&gt; that</em></ins></span> 
can <span class="removed"><del><strong>take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable</strong></del></span> <span 
class="inserted"><ins><em>be used for
-    lifetime tracking of users, and putting</em></ins></span> them <span 
class="removed"><del><strong>to turn the phones
-      on</strong></del></span> <span class="inserted"><ins><em>in danger. More 
than 1.4
-    billion people worldwide are affected by these proprietary 
apps,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span>
-    <span class="inserted"><ins><em>users' privacy is jeopardized by this 
surveillance tool. Data collected
-    by Baidu may be handed over</em></ins></span> to the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read 
call,</strong></del></span> <span class="inserted"><ins><em>Chinese government, 
possibly
+    &lt;p&gt;Baidu apps were &lt;a
+    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
+    caught collecting sensitive personal data&lt;/a&gt; that can be used for
+    lifetime tracking of users, and putting them in danger. More than 1.4
+    billion people worldwide are affected by these proprietary apps, and
+    users' privacy is jeopardized by this surveillance tool. Data collected
+    by Baidu may be handed over to the Chinese government, possibly
     putting Chinese people in danger.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1199,11 +1279,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the</em></ins></span> location <span 
class="inserted"><ins><em>data while in
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -1230,36 +1309,25 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+  &lt;li id="M201507030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+    &lt;p&gt;Samsung phones come with &lt;a
     
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
     that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some
-      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;</em></ins></span>
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
@@ -1270,32 +1338,24 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an</em></ins></span> article blocked from us by a paywall) 
reports that &lt;a
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
     the FBI can remotely activate the GPS and microphone in Android phones
-    and <span class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably</em></ins></span> 
Windows <span class="removed"><del><strong>laptops.)</strong></del></span> 
<span class="inserted"><ins><em>laptops).</em></ins></span>  Here is &lt;a
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+  &lt;li id="M201307280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    by Google, use a modified version of Android that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+  &lt;li id="M201307250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A Motorola phone &lt;a
@@ -1310,16 +1370,14 @@
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
-    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1329,81 +1387,48 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>some of its phones. The app will give Verizon the 
same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="removed"><del><strong>spyware 
is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user</strong></del></span> data to <span class="removed"><del><strong>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application 
not</strong></del></span> <span class="inserted"><ins><em>Adobe&lt;/a&gt;.  
Adobe's &ldquo;excuse&rdquo;: it's
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not</em></ins></span> only
-  <span class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>the Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>phone, and</strong></del></span> <span 
class="inserted"><ins><em>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1417,45 +1442,25 @@
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After</em></ins></span>
-    a <span class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;
+    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    snoop on each employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that &lt;a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>public outburst, Microsoft stated 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
-    would remove this capability&lt;/a&gt;. Let's hope 
so.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912190"&gt;
+  &lt;li id="M201912190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;</em></ins></span>
-    snoop on <span class="removed"><del><strong>what 
radio</strong></del></span> <span class="inserted"><ins><em>users' detailed 
browsing habits&lt;/a&gt;. Mozilla</em></ins></span> and <span 
class="removed"><del><strong>TV programs</strong></del></span> <span 
class="inserted"><ins><em>Google
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
     removed the problematic extensions from their stores, but this shows
-    once more how unsafe nonfree software can be. Tools that</em></ins></span> 
are <span class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on what 
users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span>
-    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>protect a proprietary system are, instead, infecting 
it with
-    additional malware (the system itself being</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>original malware).&lt;/p&gt;
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
@@ -1463,13 +1468,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify</em></ins></span> who is <span 
class="removed"><del><strong>in the frame.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;</em></ins></span>
+    makes it even more vicious.&lt;/p&gt;
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>illustrates that making unauthorized copies of 
nonfree software
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
@@ -1487,33 +1492,23 @@
     &lt;p&gt;Many cr&hellip;apps, developed by various
     companies for various organizations, do &lt;a
     
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown</em></ins></span> to <span 
class="inserted"><ins><em>those companies and those
-    organizations&lt;/a&gt;.  It's actually</em></ins></span> some
-      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span class="inserted"><ins><em>widely used 
libraries that do</em></ins></span>
-    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>tracking.&lt;/p&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
 
     &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A</em></ins></span> to <span class="removed"><del><strong>be
-      sent across</strong></del></span> <span 
class="inserted"><ins><em>mistreat</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>end user.&lt;/p&gt;
+    A to mistreat the end user.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>Zoom &lt;a
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
     
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending</em></ins></span> users' <span 
class="removed"><del><strong>pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>data to 
Facebook&lt;/a&gt;</em></ins></span> even if the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
-    a Facebook account. According</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>article, 
Zoom and Facebook
-    don't even mention this surveillance</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>their privacy policy page,
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
     making this an obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;
   &lt;/li&gt;
@@ -1522,111 +1517,73 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
-      2015 it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
+    estimates whether the user has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
     Any nonfree program could be doing this, and that is a good
-    reason to use free</em></ins></span> software <span 
class="removed"><del><strong>industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+    reason to use free software instead.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary 
apps</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+  &lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps the user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>work, 
give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
     software on the device.  Many employers demand to do this.  For the
-    employee,</em></ins></span> this <span class="removed"><del><strong>in a 
way that at least</strong></del></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>simply nonfree software, as fundamentally 
unjust</em></ins></span>
-    and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. 
Not</strong></del></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>dangerous</em></ins></span> as <span 
class="removed"><del><strong>what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>any other nonfree 
software.&lt;/p&gt;</em></ins></span>
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>Great 
Nation&rdquo; app requires users to grant it &lt;a
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and 
<span class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying that</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on</em></ins></span> the 
<span class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
-    of <span class="removed"><del><strong>whether</strong></del></span> the 
<span class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app, 
and that, according to Apple, &ldquo;this kind of
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
+  &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the app <span 
class="removed"><del><strong>developer but did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>its
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1634,8 +1591,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
@@ -1644,33 +1601,21 @@
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
     proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
-    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
-    it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
+  &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of the operating system, in order to gather as much 
private</em></ins></span> data <span 
class="removed"><del><strong>about</strong></del></span> <span 
class="inserted"><ins><em>as
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
@@ -1683,235 +1628,102 @@
     &lt;p&gt;Many Android apps can track
     users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
+    exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
+  &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
-    tool</em></ins></span> for <span class="removed"><del><strong>companies, 
and the NSA takes advantage to spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>propaganda&lt;/a&gt; by natalist Christians.  
It spreads distrust
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    programs.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+  &lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
-    the <span class="removed"><del><strong>toys with</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
-    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span> <span 
class="inserted"><ins><em>menstrual</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the
-    data <span class="removed"><del><strong>may be
-      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>had 
sold the data</strong></del></span> <span class="inserted"><ins><em>can easily 
be
-    traced back</em></ins></span> to <span class="removed"><del><strong>a
-      data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker would have been able to figure 
out</strong></del></span> <span 
class="inserted"><ins><em>woman</em></ins></span> who <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>equal 
employment
-    and freedom</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward</em></ins></span> to <span 
class="inserted"><ins><em>do so. A
-    free-software app that does more or less</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>new 
one is being developed&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones and iPhones
-    running Google apps,</em></ins></span> and <span 
class="inserted"><ins><em>sometimes &lt;a
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>data for 
years&lt;/a&gt;.&lt;/p&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>be responsible for 
sending
-    the location data</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+  &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Many Android phones come with a 
huge number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>to user-installed 
apps</em></ins></span> that <span class="inserted"><ins><em>have access 
to</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access</em></ins></span> to 
<span class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>the data. This results in massive
-    surveillance</em></ins></span> on <span class="removed"><del><strong>top 
under each subsection</strong></del></span> <span 
class="inserted"><ins><em>which the user has absolutely no control.&lt;/p&gt;
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A study</em></ins></span> of 
<span class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>24 &ldquo;health&rdquo; apps found that 
19</em></ins></span> of <span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>poor
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is 
buried</em></ins></span> in <span class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>lengthy terms of service that are 
difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
 
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+  &lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Facebook offered a convenient 
proprietary
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
     way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
@@ -1921,43 +1733,15 @@
 
   &lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>AppCensus database gives information 
on</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use and
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>manufacturer 
is using it</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>code snoops</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
@@ -2501,8 +2285,9 @@
   &lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
@@ -2510,7 +2295,7 @@
     about sending it to other companies.  This shows the weakness of
     the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app would not.&lt;/p&gt;
+    anyone? A free software flashlight</em></ins></span> app <span 
class="inserted"><ins><em>would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
@@ -2569,7 +2354,8 @@
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is that it is free
+    instead. The essential advantage of Minetest is</em></ins></span> that it 
<span class="removed"><del><strong>will&lt;/a&gt;
+        pre-install</strong></del></span> <span class="inserted"><ins><em>is 
free
     software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
@@ -2601,15 +2387,15 @@
     program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop on all open processes running</em></ins></span> on <span 
class="removed"><del><strong>some of</strong></del></span> its <span 
class="removed"><del><strong>phones. The app will give Verizon the 
same</strong></del></span> <span class="inserted"><ins><em>user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
+    information <span class="removed"><del><strong>about</strong></del></span> 
<span class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
@@ -2617,8 +2403,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+    video game consoles snoop on their users and report to</em></ins></span> 
the
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
     &lt;p&gt;A game console is a computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;
@@ -2629,16 +2415,18 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
-    friends and associates&lt;/a&gt;.&lt;/p&gt;
+    collect a wide range of data about their users and their</em></ins></span> 
users' <span class="removed"><del><strong>searches that Google normally gets 
when</strong></del></span>
+    <span class="inserted"><ins><em>friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="inserted"><ins><em>do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &lt;p&gt;They</em></ins></span> use <span class="removed"><del><strong>its 
search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>this data to manipulate people to buy things, and 
hunt for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+    use a back door to manipulate</em></ins></span> the <span 
class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
@@ -2647,12 +2435,15 @@
   &lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span> 
takes <span class="removed"><del><strong>effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece 
of</strong></del></span> <span class="inserted"><ins><em>advantage
     to spy through it too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-    more spyware apps&lt;/a&gt;.&lt;/p&gt;
+    more</em></ins></span> spyware <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
@@ -2662,14 +2453,18 @@
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
+    &lt;p&gt;Blizzard Warden</em></ins></span> is
+    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -2683,31 +2478,50 @@
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
-    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
-    Not Included&rdquo;&lt;/a&gt; list &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop on users&lt;/a&gt; even if they meet
+    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    Not Included&rdquo;&lt;/a&gt; list</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
+    designed to snoop</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of the program running on some of these devices &lt;a
+    design</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>program running on some of these devices &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the user susceptible to be snooped and exploited by crackers as
+    the user susceptible to be snooped</em></ins></span> and <span 
class="inserted"><ins><em>exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>people 
that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2717,7 +2531,7 @@
 
 &lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
+don't know. You can't see out the other way.&rdquo; 
Evidently</em></ins></span> that <span class="inserted"><ins><em>was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -2725,61 +2539,82 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;TV manufacturers are turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
-    href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
-    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;Smart&rdquo; TV sets (which</em></ins></span> include <span 
class="inserted"><ins><em>spyware) that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's
 now very
+    hard to find a TV that doesn't spy</em></ins></span> on <span 
class="removed"><del><strong>what radio and</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It appears that those manufacturers business model is not to 
produce
-    TV and sell them for money, but to collect your personal data and
+    &lt;p&gt;It appears that those manufacturers business model is not to 
produce</em></ins></span>
+    TV <span class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>and sell them for money, but to collect your personal 
data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
+    &lt;p&gt;TV manufacturers</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also 
on</strong></del></span> <span class="inserted"><ins><em>able to &lt;a
     
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    every second of</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the user is watching&lt;/a&gt;. This is illegal 
due to
     the Video Privacy Protection Act of 1988, but they're circumventing
-    it through EULAs.&lt;/p&gt;
+    it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201901070"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
     collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    CTO, and this data is sold to third parties. This is in 
return</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?)</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take</strong></del></span> 
<span class="inserted"><ins><em>make this spying acceptable,</em></ins></span> 
according to <span class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>him,</em></ins></span>
+    is <span class="inserted"><ins><em>that it is opt-in</em></ins></span> in 
<span class="inserted"><ins><em>newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
     and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
+    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>make sure it isn't spying on you is</em></ins></span>
+    to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+    if you</em></ins></span> are <span 
class="removed"><del><strong>likely</strong></del></span> <span 
class="inserted"><ins><em>technically oriented, is</em></ins></span> to <span 
class="inserted"><ins><em>get your own router (which can</em></ins></span>
+    be
+      <span class="removed"><del><strong>sent across the wire to Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>an old computer 
running completely free software),</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2789,36 +2624,48 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from</em></ins></span> the 
<span class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
+    the TV reports what it is. The existence of</em></ins></span> a way to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example 
of</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>attitude of</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-  &lt;li id="M201511130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
+    sounds to be picked up by</em></ins></span> proprietary <span 
class="removed"><del><strong>apps for mobile</strong></del></span> <span 
class="inserted"><ins><em>malware running
+    on other</em></ins></span> devices <span 
class="removed"><del><strong>report which</strong></del></span> <span 
class="inserted"><ins><em>in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers can correlate ads with Web activity, 
and</em></ins></span> other
+    <span class="removed"><del><strong>apps the user has
+    installed.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
+    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
+    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>possible to turn this off, but having it enabled by 
default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2838,26 +2685,33 @@
   &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track</em></ins></span>
+    what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people are 
watching&lt;/a&gt;, even if it isn't a TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs</em></ins></span> 
snoop on <span class="inserted"><ins><em>what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2866,11 +2720,15 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or some
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the 
phone</strong></del></span> <span 
class="inserted"><ins><em>another</em></ins></span> company, <span 
class="inserted"><ins><em>Nuance&lt;/a&gt;.
+    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>US 
or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span 
class="inserted"><ins><em>free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
@@ -2884,7 +2742,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    snooping all</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
@@ -2894,38 +2752,48 @@
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers</strong></del></span> 
<span class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
+    &lt;p&gt;This shows that laws requiring products to</em></ins></span> get
+      <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>users' formal
     consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the user <span 
class="inserted"><ins><em>watches, and the switch</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal data 
to</strong></del></span> <span class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    do lots</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
@@ -2933,23 +2801,29 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
@@ -2973,45 +2847,61 @@
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
     manufacturers promise not to look at what's in the videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    security for your home. Security means making sure they don't 
get</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your 
camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201603220"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> through <span 
class="removed"><del><strong>it too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+    into <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
@@ -3019,12 +2909,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
@@ -3054,66 +2946,120 @@
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
-    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
-  &lt;li id="M201612060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
+    conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
+    can remotely control the toys with</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>mobile phone. This 
would enable
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Barbie &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -3121,18 +3067,21 @@
     software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    whether you are &ldquo;active,&rdquo; that is</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest &lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    &lt;p&gt;Google Nest</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door &lt;a
-    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    update to its speaker devices using their back door</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
@@ -3152,16 +3101,22 @@
     an adequate basis for protecting digital privacy.  The boss can coerce
     most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+    be illegal and bosses that demand it should be 
prosecuted</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
 
-  &lt;li id="M201911190"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
@@ -3173,31 +3128,60 @@
 
   &lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
-    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
-    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Google &ldquo;Assistant&rdquo; 
records users' conversations</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
+    when <span class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what it records or sends.&lt;/p&gt;
+    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
     should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google service.&lt;/p&gt;
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
 
-  &lt;li id="M201905061"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="inserted"><ins><em>sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
     the data remain on other servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
@@ -4282,7 +4266,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:18 $
+$Date: 2021/04/15 14:32:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.400
retrieving revision 1.401
diff -u -b -r1.400 -r1.401
--- proprietary-surveillance.it.po      11 Apr 2021 15:04:18 -0000      1.400
+++ proprietary-surveillance.it.po      15 Apr 2021 14:32:26 -0000      1.401
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -150,6 +150,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary-surveillance.ja-diff.html       11 Apr 2021 15:04:18 -0000      
1.262
+++ proprietary-surveillance.ja-diff.html       15 Apr 2021 14:32:28 -0000      
1.263
@@ -117,7 +117,9 @@
 server are snoopers by nature.  We do not list them here because they
 have their own page: &lt;a
 href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
-Tethers&lt;/a&gt;.&lt;/p&gt;
+    Tethers&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;There is a similar site named &lt;a 
href="https://spyware.neocities.org"&gt;Spyware Watchdog&lt;/a&gt; that 
classifies spyware programs, so that users can be more aware that they are 
installing spyware.&lt;/p&gt;
 
 &lt;div class="important" style="clear: both"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -431,31 +433,27 @@
 
   &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
 
-    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>uses Windows 10's &ldquo;privacy policy&rdquo; to 
overtly impose a
-  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
-  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
-  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Thus, Windows is overt malware in regard to surveillance,
-  as in other issues.&lt;/p&gt;
-
-  &lt;p&gt;We can suppose Microsoft look</strong></del></span> <span 
class="inserted"><ins><em>looks</em></ins></span> at users' files for the US 
government
-    on demand, though the &ldquo;privacy policy&rdquo; does not <span 
class="removed"><del><strong>explicit</strong></del></span> <span 
class="inserted"><ins><em>explicitly</em></ins></span>
+    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>uses Windows 10's &ldquo;privacy policy&rdquo; 
to</strong></del></span> <span class="inserted"><ins><em>looks at users' files 
for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
     say so. Will it look at users' files for the Chinese government
     on demand?&lt;/p&gt;
-  <span class="inserted"><ins><em>&lt;/li&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201506170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
-    to overtly impose a &ldquo;right&rdquo; to look at
-    users' files at any time. Windows 10 full disk encryption &lt;a
-    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+    to</em></ins></span> overtly impose a &ldquo;right&rdquo; to look at
+    users' files at any time. Windows 10 full disk encryption &lt;a <span 
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;</em></ins></span>
     gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Thus, Windows is overt malware in regard to surveillance, as in
-    other issues.&lt;/p&gt;</em></ins></span>
+    other issues.&lt;/p&gt;
+
+  <span class="removed"><del><strong>&lt;p&gt;We can suppose Microsoft look at 
users' files for the US government on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on 
demand?&lt;/p&gt;</strong></del></span>
 
     &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables
     other companies to track the browsing of each specific user.&lt;/p&gt;
@@ -1040,37 +1038,47 @@
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned</em></ins></span> by <span 
class="inserted"><ins><em>IBM),</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>crime-alert service Citizen, Yelp</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>DoorDash. But it is likely that most nonfree apps 
contain
+    and <span class="removed"><del><strong>perhaps by</strong></del></span> 
<span class="inserted"><ins><em>DoorDash. But it is likely that most nonfree 
apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
-    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>case</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>DoorDash). Once this information
-    is collected by</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>company, there</em></ins></span> is no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>telling what it will be
-    used for.&lt;/p&gt;</em></ins></span>
+    delivery address (in</em></ins></span> the <span 
class="removed"><del><strong>OS in</strong></del></span> <span 
class="inserted"><ins><em>case of DoorDash). Once this information
+    is collected by</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>company, there is no telling what it 
will</em></ins></span> be <span class="removed"><del><strong>distracted 
by</strong></del></span>
+    <span class="inserted"><ins><em>used for.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>question of whether the app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
       &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because it asked the user to
-      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>DMCA and</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="inserted"><ins><em>&lt;a
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>asked the user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
+    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending it to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In</em></ins></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
       &ldquo;solution&rdquo; to surveillance: why should a flashlight
       app send any information to anyone?  A free software flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>require circumventing the iOS 
DRM.&lt;/p&gt;</em></ins></span>
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1079,15 +1087,9 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>Bluetooth the 
obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data 
about</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn</em></ins></span>
     them <span class="inserted"><ins><em>off&mdash;only until 5am.  That's 
Apple for you&mdash;&ldquo;We
     know you want</em></ins></span> to
@@ -1139,22 +1141,23 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>iMessage</em></ins></span> 
app <span class="removed"><del><strong>reports the temperature of the vibrator 
minute</strong></del></span> <span class="inserted"><ins><em>on iThings &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iMessage app</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    a server every phone number that</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>temperature of</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute</strong></del></span> <span class="inserted"><ins><em>photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -1203,7 +1206,7 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>totally inadequate 
proposed response:</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1222,8 +1225,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
-    is</em></ins></span> totally <span class="removed"><del><strong>inadequate 
proposed</strong></del></span> <span 
class="inserted"><ins><em>incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
@@ -2853,9 +2856,7 @@
     minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Note the totally inadequate proposed</em></ins></span> response: 
a <span class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>labeling
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
@@ -3104,8 +3105,10 @@
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
     listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span 
class="removed"><del><strong>check
+    &lt;p&gt;Today's technological practice does not include any way of 
making</em></ins></span>
+    a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>device 
that</em></ins></span> can <span class="removed"><del><strong>check
       and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially spying
     on you.  Even if it is air-gapped, it could be saving up records
     about you for later examination.&lt;/p&gt;</em></ins></span>
@@ -4151,7 +4154,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:18 $
+$Date: 2021/04/15 14:32:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary-surveillance.ja.po      11 Apr 2021 15:04:19 -0000      1.382
+++ proprietary-surveillance.ja.po      15 Apr 2021 14:32:28 -0000      1.383
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -131,6 +131,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- proprietary-surveillance.pot        11 Apr 2021 15:04:19 -0000      1.321
+++ proprietary-surveillance.pot        15 Apr 2021 14:32:28 -0000      1.322
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -100,6 +100,14 @@
 "Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a "
+"href=\"https://spyware.neocities.org\";>Spyware Watchdog</a> that classifies "
+"spyware programs, so that users can be more aware that they are installing "
+"spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.704
retrieving revision 1.705
diff -u -b -r1.704 -r1.705
--- proprietary-surveillance.ru.po      12 Apr 2021 08:04:25 -0000      1.704
+++ proprietary-surveillance.ru.po      15 Apr 2021 14:32:30 -0000      1.705
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 14:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -121,6 +122,13 @@
 "них есть своя страница: <a 
href=\"/proprietary/proprietary-tethers."
 "html#about-page\">Привязка в несвободных 
программах</a>."
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- pt-br.po    11 Apr 2021 15:04:20 -0000      1.373
+++ pt-br.po    15 Apr 2021 14:32:30 -0000      1.374
@@ -9838,6 +9838,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 #, fuzzy
 #| msgid "<a href=\"#TOC\">Table of contents</a>"

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.630
retrieving revision 1.631
diff -u -b -r1.630 -r1.631
--- ru.po       12 Apr 2021 08:33:02 -0000      1.630
+++ ru.po       15 Apr 2021 14:32:30 -0000      1.631
@@ -11810,6 +11810,13 @@
 "них есть своя страница: <a 
href=\"/proprietary/proprietary-tethers."
 "html#about-page\">Привязка в несвободных 
программах</a>."
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
 msgstr "Содержание"

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- tr.po       14 Apr 2021 18:29:51 -0000      1.166
+++ tr.po       15 Apr 2021 14:32:30 -0000      1.167
@@ -8928,6 +8928,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 #, fuzzy
 #| msgid "<a href=\"#TOC\">Table of contents</a>"

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- zh-cn.po    13 Apr 2021 05:59:43 -0000      1.167
+++ zh-cn.po    15 Apr 2021 14:32:30 -0000      1.168
@@ -8627,6 +8627,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 #, fuzzy
 #| msgid "<a href=\"#TOC\">Table of contents</a>"

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- zh-tw.po    11 Apr 2021 15:04:20 -0000      1.302
+++ zh-tw.po    15 Apr 2021 14:32:30 -0000      1.303
@@ -8509,6 +8509,13 @@
 "\">Proprietary Tethers</a>."
 msgstr ""
 
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org";
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
 #. type: Content of: <div><div><div><h3>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy



reply via email to

[Prev in Thread] Current Thread [Next in Thread]