www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 15 Apr 2021 15:01:26 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/04/15 15:01:25

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.429&r2=1.430
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.530&r2=1.531
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.389&r2=1.390
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.625&r2=1.626
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.401&r2=1.402
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.706&r2=1.707
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.428&r2=1.429
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.492&r2=1.493
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.374&r2=1.375
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.632&r2=1.633
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.303&r2=1.304

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- de.po       15 Apr 2021 14:32:13 -0000      1.303
+++ de.po       15 Apr 2021 19:01:21 -0000      1.304
@@ -6327,7 +6327,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.429
retrieving revision 1.430
diff -u -b -r1.429 -r1.430
--- es.po       15 Apr 2021 14:32:13 -0000      1.429
+++ es.po       15 Apr 2021 19:01:21 -0000      1.430
@@ -6311,11 +6311,25 @@
 "no es una opción activada por defecto."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""
@@ -15488,6 +15502,22 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">ha proporcionado a la policía india datos "
+#~ "personales de manifestantes</a> que condujeron a su arresto. La policía "
+#~ "solicitó la dirección IP y la ubicación del lugar donde se había 
creado "
+#~ "un documento y con esa información identificaron a los manifestantes y "
+#~ "activistas."
+
+#~ msgid ""
 #~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 #~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
 #~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.530
retrieving revision 1.531
diff -u -b -r1.530 -r1.531
--- fr.po       15 Apr 2021 18:11:10 -0000      1.530
+++ fr.po       15 Apr 2021 19:01:21 -0000      1.531
@@ -5394,11 +5394,25 @@
 "activé par défaut)."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""
@@ -13160,3 +13174,19 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google a <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">communiqué des données personnelles de "
+#~ "manifestants et activistes indiens à la police indienne</a>, ce qui a "
+#~ "conduit à leur arrestation. Les flics ont demandé l'adresse IP et la "
+#~ "localité d'où avait été créé un document et avec cette information 
ont "
+#~ "identifié ces personnes."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- it.po       15 Apr 2021 14:32:15 -0000      1.303
+++ it.po       15 Apr 2021 19:01:21 -0000      1.304
@@ -5922,7 +5922,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- ja.po       15 Apr 2021 14:32:15 -0000      1.311
+++ ja.po       15 Apr 2021 19:01:22 -0000      1.312
@@ -4614,7 +4614,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-google.de-diff.html 11 Apr 2021 15:04:17 -0000      1.57
+++ malware-google.de-diff.html 15 Apr 2021 19:01:22 -0000      1.58
@@ -456,7 +456,7 @@
       follow</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where</em></ins></span> a <span 
class="removed"><del><strong>user's movements around</strong></del></span> 
<span class="inserted"><ins><em>document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -876,7 +876,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:17 $
+$Date: 2021/04/15 19:01:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-google.de.po        11 Apr 2021 15:04:17 -0000      1.70
+++ malware-google.de.po        15 Apr 2021 19:01:22 -0000      1.71
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -742,7 +742,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-google.es.po        12 Apr 2021 10:33:22 -0000      1.69
+++ malware-google.es.po        15 Apr 2021 19:01:22 -0000      1.70
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-12 11:35+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -577,11 +578,25 @@
 msgstr "Vigilancia"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-google.fr.po        12 Apr 2021 09:50:40 -0000      1.123
+++ malware-google.fr.po        15 Apr 2021 19:01:22 -0000      1.124
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-12 11:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -572,11 +573,25 @@
 msgstr "Surveillance"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-google.pot  11 Apr 2021 15:04:17 -0000      1.65
+++ malware-google.pot  15 Apr 2021 19:01:22 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -418,7 +418,7 @@
 "Google <a "
 
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
 "over personal data of Indian protesters and activists to Indian police</a> "
-"which leaded to their arrest. The cops requested the IP address and the "
+"which led to their arrest. The cops requested the IP address and the "
 "location where a document was created and with that information, they "
 "identified protesters and activists."
 msgstr ""

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- malware-google.ru.po        12 Apr 2021 08:04:24 -0000      1.134
+++ malware-google.ru.po        15 Apr 2021 19:01:22 -0000      1.135
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -572,11 +573,25 @@
 msgstr "Слежка"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- nl.po       15 Apr 2021 14:32:15 -0000      1.304
+++ nl.po       15 Apr 2021 19:01:22 -0000      1.305
@@ -4301,7 +4301,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- pl.po       15 Apr 2021 14:32:16 -0000      1.303
+++ pl.po       15 Apr 2021 19:01:22 -0000      1.304
@@ -3825,7 +3825,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- pot 15 Apr 2021 14:32:17 -0000      1.302
+++ pot 15 Apr 2021 19:01:22 -0000      1.303
@@ -3584,7 +3584,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-surveillance.de-diff.html       15 Apr 2021 14:32:18 -0000      
1.179
+++ proprietary-surveillance.de-diff.html       15 Apr 2021 19:01:22 -0000      
1.180
@@ -1251,7 +1251,7 @@
     honestly identify the information it collects on users, instead of
     hiding it in an obscurely</em></ins></span> worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to <span class="removed"><del><strong>truly protect 
people's privacy, we must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    &lt;p&gt;However, to <span class="removed"><del><strong>truly 
protect</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -1981,19 +1981,10 @@
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>other companies from 
getting</strong></del></span> <span class="inserted"><ins><em>also uses roughly
-      five tracking libraries. Developers of</em></ins></span> this <span 
class="removed"><del><strong>personal information in</strong></del></span> 
<span class="inserted"><ins><em>app have confirmed that</em></ins></span>
-      the <span class="removed"><del><strong>first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>non-premium version</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
-      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>location tracking,</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -2011,19 +2002,16 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests</em></ins></span> you <span class="removed"><del><strong>must
-    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>circulate</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>picture you take according to who</em></ins></span> is
-    <span class="removed"><del><strong>yet another 
example</strong></del></span>
-    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
+    and suggests you circulate the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
     known-faces database, which means the pictures are likely to be
     sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -2032,79 +2020,86 @@
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may</em></ins></span> be <span class="removed"><del><strong>almost
-    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>analyzing people's conversations to serve 
them</em></ins></span> with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    it may be analyzing</em></ins></span> people's <span 
class="removed"><del><strong>privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>conversations to 
serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
+  &lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
+    spy on many sorts of data in the phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>TV programs
-    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>post 
on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apps that include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in the first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Cryptic</em></ins></span> communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated to the app's functionality, was</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
+    to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
+    legitimate, but</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>that valid? 
Software developers have no right</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when it's actually</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users are</em></ins></span> 
doing <span class="removed"><del><strong>something else.  Such a thing would be 
almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
+  
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, 
for</em></ins></span> Android <span class="removed"><del><strong>apps (but 
not</strong></del></span> <span class="inserted"><ins><em>and iOS
-    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and location information&lt;/a&gt; of their 
users</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span>
-    <span class="inserted"><ins><em>third parties.&lt;/p&gt;
+    &lt;p&gt;More</em></ins></span> than 73% <span 
class="inserted"><ins><em>and 47%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android 
<span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over</em></ins></span>
+    personal, behavioral and location information&lt;/a&gt; of their users 
<span class="removed"><del><strong>with</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span>
+    third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 
it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;,</em></ins></span> 
and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>some are starting
-    to realize that it</em></ins></span> is <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
-
-    &lt;p&gt;This article shows the &lt;a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they</em></ins></span> present <span 
class="inserted"><ins><em>snooping as a way to &ldquo;serve&rdquo;
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
+    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
     typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
@@ -2117,51 +2112,91 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study</em></ins></span> in <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of the top-ranked 
gratis proprietary</em></ins></span>
-    Android <span class="removed"><del><strong>devices when 
they</strong></del></span> <span class="inserted"><ins><em>apps contained 
recognizable tracking libraries. For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;
-
-    &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>sold.
-      Some Motorola phones modify</strong></del></span> <span 
class="inserted"><ins><em>not in fact &lt;a
+    A study</em></ins></span> in <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of</em></ins></span> 
the <span class="removed"><del><strong>500 most popular</strong></del></span> 
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span 
class="inserted"><ins><em>proprietary</em></ins></span>
+    Android <span 
class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>apps contained recognizable tracking libraries. 
For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these</strong></del></span> <span 
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
+  <span 
class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of 
them</em></ins></span> are not <span class="removed"><del><strong>free 
software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>granted</strong></del></span> that <span 
class="removed"><del><strong>the usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
+    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201505060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>apps (but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This</em></ins></span> 
is <span class="removed"><del><strong>present</strong></del></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
       send personal data</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
+    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
+    the phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>say &ldquo;I agree&rdquo;. That is no excuse 
for
+    malware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. 
Not</em></ins></span>
+    as <span class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any 
file</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs,</em></ins></span> on the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;</em></ins></span>
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>bad as 
what</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
+&lt;!-- #SpywareOnMobiles</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The nonfree Snapchat app's 
principal purpose is</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Widely used &lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>restrict the
+    use of data</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2173,139 +2208,76 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This is in addition</em></ins></span> 
to <span class="removed"><del><strong>study how iOS cr...apps spy on 
users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span>
-    the <span class="removed"><del><strong>iOS DRM.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span 
class="inserted"><ins><em>does surveillance too:</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries</em></ins></span> to <span class="removed"><del><strong>study how 
iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>snooping done by</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>phone 
company,</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>perhaps by</em></ins></span> the
-      <span class="removed"><del><strong>obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
+      obvious way</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want 
to</strong></del></span> <span class="inserted"><ins><em>OS in
-    the phone.&lt;/p&gt;
-
-    &lt;p&gt;Don't</em></ins></span> be <span 
class="removed"><del><strong>spied on&rdquo;.&lt;/p&gt;
+      That's Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation,</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>distracted by</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping on
+      &mdash; which would mean no way to</strong></del></span> use <span 
class="inserted"><ins><em>by companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>asked</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span 
class="inserted"><ins><em>question</em></ins></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can</strong></del></span> <span class="inserted"><ins><em>whether the 
app developers</em></ins></span>
-    get <span class="removed"><del><strong>them from 
there.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users to 
say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;</em></ins></span>
+      lots of</strong></del></span> <span class="inserted"><ins><em>user to
+    approve sending</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in</em></ins></span> a <span 
class="removed"><del><strong>server every phone number</strong></del></span> 
<span class="inserted"><ins><em>way</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers for</strong></del></span> at least <span 
class="removed"><del><strong>30
+  &lt;li&gt;&lt;p&gt;The iMessage</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> app <span 
class="removed"><del><strong>on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>developer but did not ask
+    about sending it to other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>weakness 
of</em></ins></span>
+    the <span class="removed"><del><strong>server records these numbers for at 
least 30
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>is visible</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
-    as bad as what</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span>
+    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a <span class="removed"><del><strong>valid email address and receiving the code 
Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>flashlight 
app send any information</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of 
the</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version</em></ins></span> of 
<span class="removed"><del><strong>the most popular iOS 
apps</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+    &lt;p&gt;FTC says</em></ins></span> most <span 
class="removed"><del><strong>popular iOS</strong></del></span> <span 
class="inserted"><ins><em>mobile</em></ins></span> apps <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>Apple's servers all</strong></del></span> 
<span class="inserted"><ins><em>restrict</em></ins></span> the <span 
class="removed"><del><strong>photos and
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all the photos and
       videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
       iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span class="inserted"><ins><em>use of data</em></ins></span> on <span 
class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>user's computer,</em></ins></span> but <span 
class="removed"><del><strong>it's active by default so</strong></del></span> it 
<span class="removed"><del><strong>still counts as a</strong></del></span> 
<span class="inserted"><ins><em>does</em></ins></span> surveillance <span 
class="removed"><del><strong>functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>too:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries</em></ins></span> to get <span class="removed"><del><strong>at 
them, but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>the user's list</em></ins></span> of <span 
class="removed"><del><strong>them through</strong></del></span> <span 
class="inserted"><ins><em>other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201312060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>user to
-    approve sending personal data to</em></ins></span> the <span 
class="removed"><del><strong>iThing is,
-      and get</strong></del></span> <span class="inserted"><ins><em>app 
developer but did not ask
-    about sending it to</em></ins></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;There is also</strong></del></span> <span 
class="inserted"><ins><em>companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should</em></ins></span> a <span 
class="removed"><del><strong>feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>flashlight app send any information</em></ins></span> 
to <span class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+      and keeps them up</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2318,197 +2290,235 @@
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop</strong></del></span>
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>say 
whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
-    on <span class="removed"><del><strong>all the data in an iThing,
-      or</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
+    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means</em></ins></span> it <span 
class="removed"><del><strong>is totally 
incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can do so.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;That almost certainly</em></ins></span> means
+      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span>
+    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> it <span class="removed"><del><strong>still counts as 
a</strong></del></span> <span class="inserted"><ins><em>can do so.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201307110"&gt;
+  &lt;li id="M201307110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>imposing its
-    surveillance on the game of Minecraft by &lt;a
-    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can</strong></del></span> <span class="inserted"><ins><em>will merge all 
accounts into its network,
-    which will give them access to people's data.&lt;/p&gt;
+    &lt;p&gt;Microsoft is imposing its</em></ins></span>
+    surveillance <span class="removed"><del><strong>functionality.&lt;/p&gt;
 
-    &lt;p&gt;Minecraft players</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>on the game</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give</em></ins></span> them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects the user's computer freedom. As a bonus,
-    it offers more options.&lt;/p&gt;</em></ins></span>
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
+  &lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>phone has</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Morally, we see</em></ins></span> no <span 
class="removed"><del><strong>SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>iThing is,</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with</strong></del></span> <span 
class="inserted"><ins><em>difference between having human workers listen and
-    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
+    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201806240"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell is a</em></ins></span> spyware <span 
class="removed"><del><strong>sending lots of</strong></del></span> <span 
class="inserted"><ins><em>that
-    is found in many proprietary games. It &lt;a
-    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span>
+    is <span class="removed"><del><strong>still true</strong></del></span> 
<span class="inserted"><ins><em>found</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks</em></ins></span> data <span class="removed"><del><strong>from 
iPhones for the state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804144"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>the massive
-    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>turn the 
phones</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to</em></ins></span> snoop on all <span class="removed"><del><strong>the 
data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711070"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information</em></ins></span> to <span class="removed"><del><strong>the 
microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201512290"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>a computer,</em></ins></span> and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow</strong></del></span> <span class="inserted"><ins><em>you can't 
trust</em></ins></span> a <span class="removed"><del><strong>user's movements 
around</strong></del></span> <span class="inserted"><ins><em>computer 
with</em></ins></span>
+    a <span class="removed"><del><strong>physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree operating system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
-    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
 
-  &lt;li id="M201509160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
+    collect a wide range</em></ins></span> of data <span 
class="inserted"><ins><em>about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is</strong></del></span> 
<span class="inserted"><ins><em>merge the data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a
-      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>lot of money. 
They also
-    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,
+      &lt;a 
href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span> 
<span class="inserted"><ins><em>buy things, and hunt for
+    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>be led</em></ins></span> to <span 
class="removed"><del><strong>turn the phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>spend a lot of money. They also
+    use a back door</em></ins></span> to <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>game play for 
specific players.&lt;/p&gt;
+
+    &lt;p&gt;While</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> <span class="inserted"><ins><em>companies, 
and</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
+    to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come with</strong></del></span> <span 
class="inserted"><ins><em>spy through it too&lt;/a&gt;.  Here's information 
on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+  &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>hidden
-    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>they send so much data that their 
transmission is</strong></del></span> <span 
class="inserted"><ins><em>sniffs</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested by the user, clearly must constitute 
spying</strong></del></span>
+    <span class="inserted"><ins><em>good deal</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data&lt;/a&gt;, including lots of activities 
which
+    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2517,34 +2527,41 @@
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    &lt;p&gt;Most Internet connected devices</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span> <span 
class="inserted"><ins><em>Mozilla's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>users&lt;/a&gt; 
even if they meet
+    designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of the program running on some of these devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the user susceptible</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be snooped and exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
+    well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+  &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
       too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
@@ -2569,7 +2586,7 @@
       expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
         where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
-before <span class="removed"><del><strong>and after 
going</strong></del></span> <span class="inserted"><ins><em>Amazon 
&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+before <span class="inserted"><ins><em>Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202010282"&gt;
@@ -2578,14 +2595,14 @@
     &lt;p&gt;TV manufacturers are turning to produce only
     &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
     href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
-    hard</em></ins></span> to <span 
class="inserted"><ins><em>find</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>TV that 
doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
+    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It appears that those manufacturers business model is not to 
produce
-    TV and sell them for money, but to collect your personal data and
-    (possibly) hand over them to others for 
benefit.&lt;/p&gt;</em></ins></span>
+    TV</em></ins></span> and <span class="removed"><del><strong>after 
going</strong></del></span> <span class="inserted"><ins><em>sell them for 
money, but to collect your personal data and
+    (possibly) hand over them</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>others 
for benefit.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
@@ -2615,52 +2632,58 @@
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>make this spying acceptable, according to him,
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note 
that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>spying 
acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>him,
     is that it is opt-in in newer models. But since the Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
+    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>easiest 
way</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
+    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may
+    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span> <span class="inserted"><ins><em>make sure it isn't 
spying</em></ins></span> on <span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
-    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which 
can</em></ins></span>
-    be <span class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span class="inserted"><ins><em>an old 
computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>serve 
them</strong></del></span> <span class="inserted"><ins><em>block connections to 
Vizio's servers. Or, as a last resort,
-    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>targeted
-    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;</em></ins></span>
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>do lots 
of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>block connections</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+   &lt;p&gt;Verizon</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
+    is too bad</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span class="removed"><del><strong>its 
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to 
Netflix.</em></ins></span> The <span 
class="inserted"><ins><em>Netflix</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon the same
-   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+   &lt;p&gt;Currently,</strong></del></span> the <span 
class="inserted"><ins><em>article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app <span class="removed"><del><strong>is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2669,11 +2692,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app</strong></del></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span> <span 
class="inserted"><ins><em>viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span> 
and
+    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span> 
and
     <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the
     <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>image is coming 
from</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
     the
@@ -2736,40 +2755,40 @@
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;
+    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snoops</em></ins></span> on what <span class="removed"><del><strong>radio 
and TV</strong></del></span> programs 
+      <span class="removed"><del><strong>are playing nearby&lt;/a&gt;.  
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and 
even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+  &lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs</em></ins></span> 
snoop on what <span class="removed"><del><strong>radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what</strong></del></span>
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on what
     users <span class="removed"><del><strong>post on various sites 
       such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -2793,15 +2812,12 @@
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not</em></ins></span> to be
-      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is 
done by free
+      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>third
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2810,7 +2826,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    snooping all</em></ins></span> the <span class="removed"><del><strong>wire 
to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
@@ -2826,47 +2845,48 @@
     &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
     consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
       anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
-    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
       is based on proprietary malware (DRM and snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>TV 
will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+      2015 it</strong></del></span>
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span class="inserted"><ins><em>TV 
will not
-    work.&rdquo;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a 
way</strong></del></span> <span class="inserted"><ins><em>TVs are not 
allowed</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example of
-      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report 
which</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
 
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the user <span 
class="inserted"><ins><em>watches, and the switch to turn this 
off</em></ins></span> has
-    <span class="removed"><del><strong>installed.</strong></del></span>
-    <span class="inserted"><ins><em>no effect&lt;/a&gt;.  (The fact that the 
transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even worse, it &lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on</em></ins></span> other
+    <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy</em></ins></span> this <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
@@ -2949,11 +2969,9 @@
   &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
+    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
@@ -2963,7 +2981,9 @@
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
     to <span class="removed"><del><strong>anyone?  A free software flashlight
       app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -2977,38 +2997,39 @@
 
 <span class="removed"><del><strong>&lt;ul&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>child's speech, and even 
speak</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote changes to the 
code could surely convert it</em></ins></span>
-    into <span class="inserted"><ins><em>one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers to listen in on a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
@@ -3032,17 +3053,17 @@
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really <span class="removed"><del><strong>matter. If 
it had sold the data to a
-      data broker, the data broker would have been able to figure out
-      who the user was.&lt;/p&gt;
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
        manufacturer&lt;/a&gt;. Guess what?
       &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
@@ -3084,8 +3105,15 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;CloudPets&rdquo; toys with 
microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -3100,21 +3128,30 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>matter. If it 
had sold</em></ins></span> the <span class="removed"><del><strong>specific 
sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data 
to</em></ins></span> a <span class="removed"><del><strong>&ldquo;clean&rdquo; 
Windows install is not really
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>data
-    broker, the data broker would have been able</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-section"&gt;
+  &lt;li id="M201612060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -3122,22 +3159,25 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
-
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -3146,23 +3186,14 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -3170,35 +3201,19 @@
 
 &lt;!-- #SpywareOnTheRoad</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit &lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201502180"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
     <span class="inserted"><ins><em>&lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;</strong></del></span> <span class="inserted"><ins><em>children 
and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The 
Road&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
   &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
@@ -3371,9 +3386,9 @@
 
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are made available to
+    speakers are likewise stored longer than necessary on the 
servers</em></ins></span>
+    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
+    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are 
tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
     access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
     at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
@@ -3696,11 +3711,12 @@
       snooping all</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+  &lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
@@ -3770,16 +3786,16 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    &lt;p&gt;The driver for</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span> <span class="inserted"><ins><em>built-in
     cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3828,20 +3844,16 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their users and their users' 
-      friends</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span 
class="inserted"><ins><em>determine</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>data to 
manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>information, but if the state orders 
it</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>get the 
data</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
@@ -3849,8 +3861,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available</em></ins></span> to <span class="removed"><del><strong>spend a 
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers, 
insurance companies, and others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
 
     &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
       also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -4278,7 +4294,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists</em></ins></span> to 
<span class="removed"><del><strong>snoop on other people, 
DJI</strong></del></span> <span class="inserted"><ins><em>Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -4470,7 +4486,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/15 14:32:18 $
+$Date: 2021/04/15 19:01:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.389
retrieving revision 1.390
diff -u -b -r1.389 -r1.390
--- proprietary-surveillance.de.po      15 Apr 2021 14:32:20 -0000      1.389
+++ proprietary-surveillance.de.po      15 Apr 2021 19:01:22 -0000      1.390
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5822,7 +5822,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-surveillance.es.po      15 Apr 2021 14:32:22 -0000      1.181
+++ proprietary-surveillance.es.po      15 Apr 2021 19:01:22 -0000      1.182
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-12 12:06+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -5294,11 +5294,25 @@
 "\">#SpywareInNetworks</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.625
retrieving revision 1.626
diff -u -b -r1.625 -r1.626
--- proprietary-surveillance.fr.po      15 Apr 2021 18:11:10 -0000      1.625
+++ proprietary-surveillance.fr.po      15 Apr 2021 19:01:22 -0000      1.626
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-15 20:10+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -5313,11 +5314,25 @@
 "\">#SpywareInNetworks</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary-surveillance.it-diff.html       15 Apr 2021 14:32:25 -0000      
1.245
+++ proprietary-surveillance.it-diff.html       15 Apr 2021 19:01:22 -0000      
1.246
@@ -632,22 +632,10 @@
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span> <span 
class="inserted"><ins><em>not really clean since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -655,9 +643,7 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span> <span 
class="inserted"><ins><em>Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -671,205 +657,96 @@
   &lt;li id="M202102200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> proprietary <span 
class="removed"><del><strong>apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>program Clubhouse
-    is malware and a privacy disaster. Clubhouse</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit 
users'</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
-    people's</em></ins></span> personal data <span 
class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span> <span class="inserted"><ins><em>such as 
recordings</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>people's
+    &lt;p&gt;The proprietary program Clubhouse
+    is malware and a privacy disaster. Clubhouse &lt;a
+    
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
+    people's personal data such as recordings of people's
     conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
-    which shows a bad security part</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>issue.&lt;/p&gt;
+    which shows a bad security part of the issue.&lt;/p&gt;
 
     &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
-    in plaintext, and Agora (the company behind</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+    in plaintext, and Agora (the company behind the app) would likely
+    have access to users' raw audio, potentially providing access to
+    the Chinese government.&lt;/p&gt;
 
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app) would likely
-    have access to users' raw audio, potentially providing access 
to</em></ins></span>
-    the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government.&lt;/p&gt;
-
-    &lt;p&gt;Even with good security</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>data transmission, collecting personal
-    data of people</em></ins></span> is <span class="removed"><del><strong>not 
enough
-to legitimize actions like this.  At this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> and <span 
class="removed"><del><strong>honestly identify the information it collects on 
users, instead</strong></del></span> <span class="inserted"><ins><em>a 
violation</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect</strong></del></span> people's <span 
class="removed"><del><strong>privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>privacy 
rights.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even with good security of data transmission, collecting personal
+    data of people is wrong and a violation of people's privacy 
rights.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202101080"&gt;
+  &lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries) 
is</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users</em></ins></span> to <span 
class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span class="inserted"><ins><em>hand over 
sensitive personal data&lt;/a&gt; to its parent
-    company.</em></ins></span> This <span class="removed"><del><strong>is
-    yet another example</strong></del></span> <span 
class="inserted"><ins><em>increases Facebook's power over users, and further
+    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
+    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    its users to hand over sensitive personal data&lt;/a&gt; to its parent
+    company. This increases Facebook's power over users, and further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
-    &lt;p&gt;Instead</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending to obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with</strong></del></span> <span 
class="inserted"><ins><em>WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which 
is</em></ins></span>
-    free <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software and will not collect your 
data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Instead of WhatsApp you can use &lt;a
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
+    free software and will not collect your data.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202006260"&gt;
+  &lt;li id="M202006260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most</em></ins></span> apps <span class="inserted"><ins><em>are 
malware, but
-    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>as well
-    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The article <span 
class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>says that Biden's app has a less manipulative overall
-    approach, but that does</em></ins></span> not <span 
class="removed"><del><strong>have described these apps</strong></del></span> 
<span class="inserted"><ins><em>tell us whether it has functionalities we
-    consider malicious, such</em></ins></span> as
-  <span class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they 
are</strong></del></span> <span class="inserted"><ins><em>sending data the user 
has</em></ins></span> not <span class="removed"><del><strong>free software.  
The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted that the usual analytics tools are
-  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>explicitly
-    asked</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+    &lt;p&gt;Most apps are malware, but
+    Trump's campaign app, like Modi's campaign app, is &lt;a
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says that Biden's app has a less manipulative overall
+    approach, but that does not tell us whether it has functionalities we
+    consider malicious, such as sending data the user has not explicitly
+    asked to send.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201809121"&gt;
+  &lt;li id="M201809121"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when 
they</strong></del></span> <span class="inserted"><ins><em>three other 
companies</em></ins></span> are <span class="removed"><del><strong>sold.
-      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>facing a lawsuit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
+    by Google, Twitter and three other companies are facing a lawsuit &lt;a
+    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
     violating people's privacy by collecting their data from mobile games
-    and handing over these</em></ins></span> data to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
+  &lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-
-&lt;!-- #SpywareOnMobiles</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+  &lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;According</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
-    smartphones&lt;/a&gt; by sending hidden text messages</em></ins></span> 
which <span class="removed"><del><strong>would mean no way to use it without 
having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>enable
-    them</em></ins></span> to <span class="removed"><del><strong>tell 
whether</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>and off, listen</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them</strong></del></span> <span class="inserted"><ins><em>the 
microphone,
-    retrieve geo-location data</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
-    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>web browsing history, and
-    read</em></ins></span> the <span class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>contact 
list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+    smartphones&lt;/a&gt; by sending hidden text messages which enable
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed to disguise itself
+    from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
+  &lt;li id="M201311120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>most popular iOS 
apps</strong></del></span> <span class="inserted"><ins><em>universal back door 
that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
@@ -877,21 +754,9 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send</em></ins></span> their <span class="inserted"><ins><em>GPS 
location on remote command, and</em></ins></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's 
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require</em></ins></span> 
all <span class="removed"><del><strong>the photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -905,15 +770,9 @@
   &lt;li id="M202009183"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops</em></ins></span>
-    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
-      &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>Instagram&lt;/a&gt; users</em></ins></span> by 
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>device's
+    &lt;p&gt;Facebook &lt;a
+    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -921,25 +780,18 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>practice of surreptitiously activating the Siri 
software</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
     &lt;p&gt;His job was to listen to these recordings, in a group that made
-    transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He 
does not believes that Apple has ceased</em></ins></span> this
-    <span class="inserted"><ins><em>practice.&lt;/p&gt;
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is, 
for the program that
-    controls access</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>the 
microphone</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access</strong></del></span> <span class="inserted"><ins><em>decide 
when the user has
-    &ldquo;activated&rdquo;</em></ins></span> any <span 
class="removed"><del><strong>of them through</strong></del></span> <span 
class="inserted"><ins><em>service, to be free software, and the
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
     operating system under it free as well. This way, users could make
     sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
@@ -947,108 +799,64 @@
   &lt;li id="M201910131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> <span 
class="inserted"><ins><em>China to</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
     Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>Chinese government, 
its Safe Browsing black list most certainly
+    with the Chinese government, its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
+  &lt;li id="M201905280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>track users, which is</strong></del></span>
-    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that 
are busy at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6, but</strong></del></span> <span 
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
     Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But</em></ins></span> it is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
+    and DoorDash. But it is likely that most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it 
will</em></ins></span> be
-      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>used for.&lt;/p&gt;</em></ins></span>
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+  &lt;li id="M201711250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of</strong></del></span> iOS <span 
class="removed"><del><strong>seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>DRM.&lt;/p&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="inserted"><ins><em>obvious way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>turn the phones
-      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>use it without having your fingerprints taken. Users 
would have
-    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read the contact list. This 
malware</strong></del></span> <span 
class="inserted"><ins><em>phone</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>snooping on them.&lt;/p&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
@@ -1056,103 +864,53 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself</strong></del></span> 
<span class="inserted"><ins><em>Apple's servers&lt;/a&gt;.  Big Brother can get
-    them</em></ins></span> from <span 
class="removed"><del><strong>investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there.&lt;/p&gt;</em></ins></span>
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
+  &lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iMessage app on iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission 
is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</em></ins></span>
-    a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> <span 
class="inserted"><ins><em>server every</em></ins></span> phone
-      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>number that</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user types into 
it&lt;/a&gt;;</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span>
-    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
+    &lt;p&gt;The iMessage app on iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that the user types into it&lt;/a&gt;; the
+    server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
-    and <span class="removed"><del><strong>microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>videos they 
make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
-      remote command</strong></del></span> <span 
class="inserted"><ins><em>video you
-    take,</em></ins></span> and <span class="removed"><del><strong>users 
cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>keeps them 
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    and videos they make.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
+    take, and keeps them up to date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span class="removed"><del><strong>to 
restrict</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span>
-    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer,</strong></del></span> 
<span class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; 
means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;,</em></ins></span> but <span 
class="inserted"><ins><em>it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>does</strong></del></span> <span 
class="inserted"><ins><em>still counts as a</em></ins></span>
-    surveillance
-      <span class="removed"><del><strong>too:</strong></del></span> <span 
class="inserted"><ins><em>functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security</em></ins></span> to get <span class="removed"><del><strong>the 
user's list</strong></del></span> <span class="inserted"><ins><em>at them, but 
NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+  &lt;li id="M201409220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some</em></ins></span> data <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
@@ -1989,7 +1747,7 @@
   &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    &lt;p&gt;A study found 234 Android apps</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
@@ -1998,9 +1756,10 @@
   &lt;li id="M201704260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do lots</em></ins></span> of <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -2022,7 +1781,8 @@
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs of Android apps can collude
+    &lt;p&gt;Pairs of</em></ins></span> Android apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
+  the paid</strong></del></span> <span class="inserted"><ins><em>can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
@@ -2033,14 +1793,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    announced an opt-in</em></ins></span> proprietary <span 
class="removed"><del><strong>apps,</strong></del></span> <span 
class="inserted"><ins><em>search app that</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install
     on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    being pre-installed on</em></ins></span> only <span 
class="removed"><del><strong>60%.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -2056,29 +1816,48 @@
 
   &lt;li id="M201611280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact</strong></del></span> <span 
class="inserted"><ins><em>Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>that word</strong></del></span> <span 
class="inserted"><ins><em>surveillance</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A &lt;a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and security of
-    283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+&lt;li&gt;
+  &lt;p&gt;A study found 234</strong></del></span> <span 
class="inserted"><ins><em>investigated the privacy and security of
+    283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="inserted"><ins><em>concluded</em></ins></span> that <span 
class="removed"><del><strong>track users</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite of the promises
+    for privacy, security, and anonymity given</em></ins></span> by
+       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the majority of VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span> <span class="inserted"><ins><em>poor security
+    guarantees and abusive practices inflicted</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>VPN 
apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research 
paper,</em></ins></span>
+    of <span class="removed"><del><strong>Android</strong></del></span> <span 
class="inserted"><ins><em>some proprietary VPN</em></ins></span> apps <span 
class="removed"><del><strong>can collude</strong></del></span> <span 
class="inserted"><ins><em>that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
@@ -2088,11 +1867,13 @@
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
-      text messages.&lt;/dd&gt;
+      permissions upon installation, meaning it has full 
access</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> users' <span 
class="removed"><del><strong>personal
+       data</strong></del></span>
+      <span class="inserted"><ins><em>text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span> <span class="inserted"><ins><em>read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
@@ -2102,19 +1883,22 @@
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
+      users. The stated purpose</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>the JS injection is to display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
+      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+      <span class="inserted"><ins><em>the non-premium version of the app does 
JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
@@ -2125,19 +1909,41 @@
   &lt;li id="M201606050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    &lt;p&gt;Facebook's new Magic Photo</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you circulate</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
+    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>require 
online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>pictures</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>likely to be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
+    even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
+    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -2146,33 +1952,39 @@
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    it may</em></ins></span> be <span class="removed"><del><strong>almost
+    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>analyzing people's conversations to serve 
them</em></ins></span> with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201604250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
+    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps that include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>TV programs
+    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>post 
on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    &lt;p&gt;&ldquo;Cryptic</em></ins></span> communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
@@ -2186,41 +1998,55 @@
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  &lt;li id="M201510300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and location information&lt;/a&gt; of their users to
-    third parties.&lt;/p&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, 
for</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span> <span class="inserted"><ins><em>and 
iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt; of their users to
+    third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201508210"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>present 
in</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that it is nasty.&lt;/p&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, 
and</em></ins></span> some <span class="removed"><del><strong>Android devices 
when they</strong></del></span> are <span class="removed"><del><strong>sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>starting</em></ins></span>
+    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This article shows the &lt;a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This 
is</em></ins></span> a
+      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>typical example of the attitude of the 
proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506264"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
+    A study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
     Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
@@ -2228,29 +2054,88 @@
     &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-  &lt;li id="M201505060"&gt;
+&lt;!-- #SpywareOnMobiles</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Widely used &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
-    the phone.&lt;/p&gt;
+    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the user&lt;/a&gt;. This is</em></ins></span> in 
<span class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span>
+    the <span class="removed"><del><strong>phone is</strong></del></span> 
snooping <span class="removed"><del><strong>on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every</strong></del></span> <span 
class="inserted"><ins><em>done by the</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>OS 
in</em></ins></span>
+    the <span class="removed"><del><strong>server records these numbers for at 
least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by</em></ins></span> the <span 
class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>question</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>app developers
+    get</em></ins></span> users <span class="removed"><del><strong>with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>say &ldquo;I 
agree&rdquo;. That</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2258,70 +2143,116 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    report which other apps</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
+    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
+    is <span class="inserted"><ins><em>doing this in</em></ins></span> a way 
<span class="removed"><del><strong>to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>that at least is 
visible and optional&lt;/a&gt;. Not
+    as bad</em></ins></span> as <span class="inserted"><ins><em>what the 
others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    &lt;p&gt;The Simeji keyboard is</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span> <span class="inserted"><ins><em>restrict the
+    use</em></ins></span> of <span class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>data on</em></ins></span> the <span 
class="inserted"><ins><em>user's computer, but it does surveillance 
too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
+      and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to</em></ins></span> get <span class="inserted"><ins><em>the 
user's list of</em></ins></span> other <span class="removed"><del><strong>info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people's 
phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search</strong></del></span>
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+    sends user data, including geolocation, for use</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because</em></ins></span> it
+      <span class="removed"><del><strong>is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>asked</em></ins></span> the <span 
class="inserted"><ins><em>user to
+    approve sending personal</em></ins></span> data <span 
class="removed"><del><strong>in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>to the app 
developer but did not ask
+    about sending</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to 
<span class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
+    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight</em></ins></span> app <span 
class="inserted"><ins><em>would not.&lt;/p&gt;
+    anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly means it</em></ins></span> can <span 
class="removed"><del><strong>take over 
smartphones&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>do 
so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2346,26 +2277,26 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft is imposing its
-    surveillance on the game of Minecraft by &lt;a
+    surveillance on the game of Minecraft</em></ins></span> by <span 
class="removed"><del><strong>sending hidden text messages</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
     every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its network,
-    which will give them access to people's data.&lt;/p&gt;
+    has bought the game and will merge all accounts into its 
network,</em></ins></span>
+    which <span class="removed"><del><strong>enable</strong></del></span> 
<span class="inserted"><ins><em>will give</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is</em></ins></span> that it 
<span class="removed"><del><strong>will&lt;/a&gt;
-        pre-install</strong></del></span> <span class="inserted"><ins><em>is 
free
-    software, meaning it respects the user's computer freedom. As a bonus,
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
+    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers</em></ins></span> listen to the <span 
class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
@@ -2377,7 +2308,9 @@
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> data <span class="removed"><del><strong>from the
+      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>on users' 
computers</em></ins></span> and <span class="removed"><del><strong>web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sends it to third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
@@ -2387,15 +2320,15 @@
     program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running</em></ins></span> on <span 
class="removed"><del><strong>some of</strong></del></span> its <span 
class="removed"><del><strong>phones. The app will give Verizon the 
same</strong></del></span> <span class="inserted"><ins><em>user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
-    information <span class="removed"><del><strong>about</strong></del></span> 
<span class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
@@ -2403,68 +2336,73 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to</em></ins></span> 
the
+    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
     <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console is a computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
+      disguise itself from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
+    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their</em></ins></span> 
users' <span class="removed"><del><strong>searches that Google normally gets 
when</strong></del></span>
-    <span class="inserted"><ins><em>friends and associates&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="inserted"><ins><em>do it through ad networks that merge the data
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is</strong></del></span> 
<span class="inserted"><ins><em>merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They</em></ins></span> use <span class="removed"><del><strong>its 
search engine.&lt;/p&gt;
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a
+      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>lot of money. 
They also
+    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>this data to manipulate people to buy things, and 
hunt for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate</em></ins></span> the <span 
class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
+    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost money
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span> 
takes <span class="removed"><del><strong>effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece 
of</strong></del></span> <span class="inserted"><ins><em>advantage
+    spies</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> <span class="inserted"><ins><em>companies, 
and</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
     to spy through it too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-    more</em></ins></span> spyware <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+    more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200510200"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden</em></ins></span> is
-    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
+      reports</strong></del></span> <span class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -2478,60 +2416,61 @@
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
-    Not Included&rdquo;&lt;/a&gt; list</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt; even if they meet
+    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
+    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    Not Included&rdquo;&lt;/a&gt; list &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
+    designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>program running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
-    the user susceptible to be snooped</em></ins></span> and <span 
class="inserted"><ins><em>exploited by crackers as
+    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>people 
that use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    to snoop</em></ins></span> on
+      <span class="removed"><del><strong>remote command and users cannot stop 
them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
+      to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; 
Evidently</em></ins></span> that <span class="inserted"><ins><em>was
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -2539,83 +2478,90 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;TV manufacturers are turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which</em></ins></span> include <span 
class="inserted"><ins><em>spyware) that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's
 now very
-    hard to find a TV that doesn't spy</em></ins></span> on <span 
class="removed"><del><strong>what radio and</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
+    href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
+    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It appears that those manufacturers business model is not to 
produce</em></ins></span>
-    TV <span class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>and sell them for money, but to collect your personal 
data and
+    &lt;p&gt;It</em></ins></span> appears <span class="inserted"><ins><em>that 
those manufacturers business model is not to produce
+    TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also 
on</strong></del></span> <span class="inserted"><ins><em>able to &lt;a
-    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of</em></ins></span> what <span 
class="removed"><del><strong>users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the user is watching&lt;/a&gt;. This is illegal 
due to
-    the Video Privacy Protection Act of 1988, but they're circumventing
+    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging 
by</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal 
due</em></ins></span> to <span class="removed"><del><strong>personal data 
in</strong></del></span>
+    the <span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Video Privacy Protection Act of 1988, but they're 
circumventing
     it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections</strong></del></span>
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give 
Verizon</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in 
return</em></ins></span> for <span class="removed"><del><strong>known 
faces&lt;/a&gt;,</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?)</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>slightly
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>same
+   information about</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>own words of</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>company's
+    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>the
+    user must explicitly</strong></del></span> <span 
class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take</strong></del></span> 
<span class="inserted"><ins><em>make this spying acceptable,</em></ins></span> 
according to <span class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>him,</em></ins></span>
-    is <span class="inserted"><ins><em>that it is opt-in</em></ins></span> in 
<span class="inserted"><ins><em>newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is that it is</em></ins></span> opt-in <span 
class="removed"><del><strong>before</strong></del></span> <span 
class="inserted"><ins><em>in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>Vizio software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>scenes,
     and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>make sure it isn't spying on you is</em></ins></span>
-    to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you</em></ins></span> are <span 
class="removed"><del><strong>likely</strong></del></span> <span 
class="inserted"><ins><em>technically oriented, is</em></ins></span> to <span 
class="inserted"><ins><em>get your own router (which can</em></ins></span>
-    be
-      <span class="removed"><del><strong>sent across the wire to Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>an old computer 
running completely free software),</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
+    matter), the easiest way to make sure it isn't spying on 
you</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
+    to <span class="inserted"><ins><em>disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>terrestrial 
antenna
+    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>only</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you</em></ins></span> can <span class="inserted"><ins><em>replace your TV 
with another model.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>the 
article for the facts it presents. It
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>article for the 
facts</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app <span class="removed"><del><strong>tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2624,94 +2570,129 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+    report everything that is viewed on them,</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from</em></ins></span> the 
<span class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
-    the TV reports what it is. The existence of</em></ins></span> a way to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example 
of</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>attitude of</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
+        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
+    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up by</em></ins></span> proprietary <span 
class="removed"><del><strong>apps for mobile</strong></del></span> <span 
class="inserted"><ins><em>malware running
-    on other</em></ins></span> devices <span 
class="removed"><del><strong>report which</strong></del></span> <span 
class="inserted"><ins><em>in range so as to determine that they
+    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
+    sounds to be picked up by proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>various sites 
+      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, 
and</em></ins></span> other
-    <span class="removed"><del><strong>apps the user has
-    installed.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
-    manufacturers in spying on their users: their &lt;a
-    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>advertisers can track you
-    across devices.&lt;/p&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying on their users: their</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
+    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
+    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>possible to turn this off, but having it enabled by 
default
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across the wire</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
+    to <span class="removed"><del><strong>Facebook's servers and 
face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
+    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track</em></ins></span>
-    what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people are 
watching&lt;/a&gt;, even if it isn't a TV channel.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps the user has
+    installed.</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
+    snoops on what programs people watch,</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
     record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs</em></ins></span> 
snoop on <span class="inserted"><ins><em>what
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
+    used <span class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to make its 
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2720,74 +2701,72 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the 
phone</strong></del></span> <span 
class="inserted"><ins><em>another</em></ins></span> company, <span 
class="inserted"><ins><em>Nuance&lt;/a&gt;.
-    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>US 
or some
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> 
<span class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span 
class="inserted"><ins><em>free
-    software in your own computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to
+      <span class="removed"><del><strong>the snooping</strong></del></span> 
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done 
by <span class="removed"><del><strong>the phone company, and perhaps by the 
OS</strong></del></span> <span class="inserted"><ins><em>free
+    software</em></ins></span> in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    data containing sensitive information will</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get
+      users</strong></del></span> <span 
class="inserted"><ins><em>transmitted</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers</strong></del></span> 
<span class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014, but we don't expect</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to</em></ins></span> get
-      <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>users' formal
-    consent before collecting personal data are totally inadequate.
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to
+      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>get users' formal
+    consent before collecting</em></ins></span> personal data <span 
class="inserted"><ins><em>are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
-    work.&rdquo;&lt;/p&gt;
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>TV will</em></ins></span> not
+      <span class="removed"><del><strong>ask about 
sending</strong></del></span>
+    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no 
excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+  &lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the user <span 
class="inserted"><ins><em>watches, and the switch</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal data 
to</strong></del></span> <span class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
+      weakness</strong></del></span> <span class="inserted"><ins><em>stop 
this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
@@ -2824,7 +2803,8 @@
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
       users identify themselves and then sends personal data about 
them</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    send the video they capture</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
@@ -2833,45 +2813,44 @@
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
-    security for your home. Security means making sure they don't 
get</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>see through your 
camera.&lt;/p&gt;</em></ins></span>
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see</em></ins></span> through <span class="removed"><del><strong>it 
too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>your camera.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+  &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage</strong></del></span>
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> through <span 
class="removed"><del><strong>it too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
@@ -2886,14 +2865,15 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
       can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
@@ -2958,108 +2938,56 @@
     Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer and <span class="removed"><del><strong>the 
FBI could listen to these conversations</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+  &lt;li id="M201612060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
-    company based</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>mobile phone. This 
would enable
-    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Barbie &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -3067,66 +2995,129 @@
     software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>effect a malicious
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
     surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
     is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt;
 that
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
     listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
     than just their wake words. Google says the software update was sent
-    out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+    out prematurely and on accident and Google</em></ins></span> was <span 
class="removed"><del><strong>unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span 
class="inserted"><ins><em>planning</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>disclosing
+    this new feature</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>offering it</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>customers who 
pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;Bossware&rdquo; is malware 
that bosses</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
     coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy on them.&lt;/p&gt;
+    bosses can spy</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>user's &ldquo;consent&rdquo;</em></ins></span> 
is not <span class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span class="inserted"><ins><em>an adequate basis for protecting digital 
privacy.  The boss can coerce
+    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be 
prosecuted</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>almost anything, even probable exposure
+    to contagious disease that</em></ins></span> can <span 
class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.  
Software like</em></ins></span> this <span class="removed"><del><strong>way, 
because they pass</strong></del></span> <span class="inserted"><ins><em>should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>should be prosecuted for 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop</em></ins></span> on 
<span class="removed"><del><strong>top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>the household
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;
+    manufacturers</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201907210"&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 
@@ -3157,11 +3148,9 @@
     way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
 
     &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>better control the use of recordings, Google
-    should not record or listen to the person's voice.  It should only
-    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
+      you.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -3169,142 +3158,185 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="inserted"><ins><em>sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
-    advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
-
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
       <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
-    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
+    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>person's 
voice.  It should only
+    get commands that</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
   &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;</em></ins></span>
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201904240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
+    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
-    voice assistants</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span 
class="removed"><del><strong>if it asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
+    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
+    advertising companies and government agencies. In other words,
+    deleting</em></ins></span> the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
     means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>Nest 
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
+    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span> 
the <span class="removed"><del><strong>time; it is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
+    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is</strong></del></span> <span class="inserted"><ins><em>servers
+    the devices are tethered to. Moreover, they are</em></ins></span> made 
available to <span class="removed"><del><strong>car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>result, Amazon has a very precise 
picture</em></ins></span> of <span class="removed"><del><strong>privacy, and 
should be replaced with anonymous
+      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>users' life
+    at home, not only in the present,</em></ins></span> but <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service staff 
even has access to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have</em></ins></span> no 
<span class="removed"><del><strong>one connects</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span>
-    to <span class="removed"><del><strong>the car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>know what happens</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>get the data
+      and hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201902080"&gt;
+
+&lt;!-- #SpywareAtHome</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS:</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span class="removed"><del><strong>cell 
phone modem
-    though.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary 
software</strong></del></span> <span class="inserted"><ins><em>subscription, 
and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span class="removed"><del><strong>cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>some
-    specific cases, it spies on users,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
-      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
+    and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine the car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information,</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers 
too,</em></ins></span> but <span class="removed"><del><strong>if the state 
orders it</strong></del></span> <span class="inserted"><ins><em>please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>get the</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>country,
+    do you think</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
@@ -3312,101 +3344,78 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage</em></ins></span> data
-      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span class="inserted"><ins><em>back 
over</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>is viewed</strong></del></span> <span 
class="inserted"><ins><em>snoops</em></ins></span> on <span 
class="removed"><del><strong>them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+  &lt;li id="M201706204"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Lots of &ldquo;smart&rdquo; 
products are designed &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>everyone in the 
house, all the time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially 
spying</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>TV reports what it 
is. The existence</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped, it could be saving up 
records
-    about you for later examination.&lt;/p&gt;
+    &lt;p&gt;Today's technological practice does not include any 
way</em></ins></span> of <span 
class="inserted"><ins><em>making</em></ins></span>
+    a <span class="removed"><del><strong>way to
+    disable the surveillance, even</strong></del></span> <span 
class="inserted"><ins><em>device that can obey your voice commands without 
potentially spying
+    on you.  Even</em></ins></span> if it <span 
class="removed"><del><strong>were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
+    &lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't 
expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal</strong></del></span>
+    data <span class="removed"><del><strong>are totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+  &lt;li id="M201310260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence of a 
way</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="removed"><del><strong>was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> will
+      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>normal</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>companies
-    monitor every aspect of</em></ins></span> what <span 
class="removed"><del><strong>happens if</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>teach the 
sheeple</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
+    monitor every aspect of</em></ins></span> what
+      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
@@ -3417,56 +3426,42 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security 
flaws. They &lt;a
-    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to 
access&lt;/a&gt;</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>watch.&lt;/p&gt;
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages</em></ins></span> to 
<span class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>and from</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>child and spoof 
messages to and from the watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>this article 
misuses</em></ins></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
-    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
+  &lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
     misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else</em></ins></span> 
and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3483,111 +3478,120 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>AWS to help 
create custom insurance premiums&lt;/a&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
     based on driver behaviour.&lt;/p&gt;
 
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can
-      <span class="removed"><del><strong>correlate ads with Web 
activity,</strong></del></span>
-    <span class="inserted"><ins><em>disconnect its cellular 
antenna</em></ins></span> and
-      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs 
recognize</strong></del></span> <span class="inserted"><ins><em>its GPS 
antenna.  If you want
-    GPS navigation, get a separate navigator which runs free 
software</em></ins></span>
-    and <span class="inserted"><ins><em>works with Open Street Map.&lt;/p&gt;
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
+    GPS navigation, get a separate navigator which runs free software
+    and works</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as</em></ins></span> it 
<span class="removed"><del><strong>isn't a TV 
channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>involves
-    cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data is nearly impossible, 
as it involves
+    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+  &lt;li id="M201903290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
<span class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Tesla cars collect lots of personal data, and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data 
goes</em></ins></span> with <span class="removed"><del><strong>online 
purchases&lt;/a&gt;, exposing all users</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+  &lt;li id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>internal car network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the cellular phone network</em></ins></span> and 
<span class="removed"><del><strong>would then</strong></del></span> <span 
class="inserted"><ins><em>sends Ford a lot of data,
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars,</em></ins></span> have <span 
class="removed"><del><strong>to
-      give it to</strong></del></span> <span class="inserted"><ins><em>you 
succeeded in breaking</em></ins></span> the <span 
class="removed"><del><strong>US</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem,</em></ins></span> or <span class="removed"><del><strong>some other 
government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>wrapping the
-    antenna in aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
+    antenna</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
-    cars</em></ins></span> to be <span class="removed"><del><strong>trusted 
unless it is done
-    by free software in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a 
terminal</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be 
transmitted</strong></del></span>
+    &lt;p&gt;In China, it is mandatory for electric
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,</em></ins></span>
-    to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+    transfers technical data, including car location,
+    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
-      the switch to turn</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>off has no effect.  (The fact 
that</strong></del></span> <span class="inserted"><ins><em>data&lt;/a&gt; as 
part of their own spying, then
-    forward it to</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201810230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;GM &lt;a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span 
class="removed"><del><strong>server</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it</em></ins></span> could 
<span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>have got</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>easily by
-    sneaking</em></ins></span> it
-      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on</strong></del></span> <span class="inserted"><ins><em>into the 
contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of</em></ins></span> other <span 
class="removed"><del><strong>devices on</strong></del></span> <span 
class="inserted"><ins><em>data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that</em></ins></span> the 
<span class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;But if you really want</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
+    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
+      transmission reports a 404 error really means nothing; the server
+      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
+      &lt;p&gt;LG later said it had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>the software
+    is free so we know it won't collect</em></ins></span> any <span 
class="removed"><del><strong>product
       could spy this way.&lt;/p&gt;
 
       &lt;p&gt;Meanwhile, LG TVs
@@ -3632,78 +3636,73 @@
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
     access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically, the app would record the names of the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>do 
because</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>system has no 
authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>modem.  
However, even if</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
 &lt;/p&gt;
-&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>track the car's 
movements all the time;
-    it is possible</em></ins></span> to <span 
class="inserted"><ins><em>physically remove</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
+    it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cell phone 
modem, though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+    &lt;p&gt;Tesla cars allow the company to extract
+    data remotely and determine the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201303250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information</em></ins></span> about <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
+    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
+    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
       companies.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
-
-    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter 
of proprietary surveillance. These systems
-    are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>game play for specific players.&lt;/p&gt;
-
-      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>article describes gratis games, games 
that cost money</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;
+      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3719,15 +3718,19 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential for the most intimate
+    creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
+
+      &lt;p&gt;While</strong></del></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
@@ -3851,17 +3854,14 @@
     &lt;p&gt;Many</em></ins></span> web sites report all their visitors
     to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
+  &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites try to collect users' address 
books (the user's list
-    of <span class="removed"><del><strong>other people's phone numbers or 
email addresses).
-      This violates</strong></del></span> <span 
class="inserted"><ins><em>other people's phone numbers or email addresses).  
This violates
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
     the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3892,18 +3892,22 @@
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>same sort</em></ins></span> of <span 
class="removed"><del><strong>those</strong></del></span>
-    <span class="inserted"><ins><em>malware to &lt;a
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+    read what the user is typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807190"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give</em></ins></span> other <span 
class="removed"><del><strong>people.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>companies personal data on
+    JavaScript on its</em></ins></span> web <span 
class="removed"><del><strong>sites try</strong></del></span> <span 
class="inserted"><ins><em>site</em></ins></span> to <span 
class="removed"><del><strong>collect users' address books (the
+      user's list of other people's phone numbers or email addresses).
+      This violates the privacy of those</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> other <span 
class="removed"><del><strong>people.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -4069,7 +4073,7 @@
       cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and 
activists.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -4266,7 +4270,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/15 14:32:25 $
+$Date: 2021/04/15 19:01:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.401
retrieving revision 1.402
diff -u -b -r1.401 -r1.402
--- proprietary-surveillance.it.po      15 Apr 2021 14:32:26 -0000      1.401
+++ proprietary-surveillance.it.po      15 Apr 2021 19:01:23 -0000      1.402
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5464,7 +5464,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary-surveillance.ja-diff.html       15 Apr 2021 14:32:28 -0000      
1.263
+++ proprietary-surveillance.ja-diff.html       15 Apr 2021 19:01:23 -0000      
1.264
@@ -1206,7 +1206,7 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>totally inadequate 
proposed response:</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3103,7 +3103,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of 
making</em></ins></span>
     a <span class="removed"><del><strong>labeling
@@ -3203,9 +3203,7 @@
 
     &lt;p&gt;Thus, ill-intentioned unauthorized people</em></ins></span> can 
<span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>intercept communications between parent and child and 
spoof messages to and from</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3215,10 +3213,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
@@ -3339,12 +3339,12 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to a government-run platform&lt;/a&gt;. In practice,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -3448,8 +3448,7 @@
     &lt;p&gt;The case of toll-collection systems, mentioned in this article,
     is not really a matter of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
-    anonymous
-      <span class="removed"><del><strong>payment systems, but the invasion 
isn't done by malware. The other
+    anonymous payment systems, but the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
       cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
@@ -3457,7 +3456,8 @@
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
       Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
       store this information, but if the state orders it to get the data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>state can store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3473,8 +3473,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;</em></ins></span>
+      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3653,16 +3652,15 @@
     &lt;p&gt;Many web sites report all their visitors
     to Google by using</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and the <span 
class="removed"><del><strong>switch to turn this off has no effect.  (The 
fact</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> that <span 
class="inserted"><ins><em>was visited&lt;/a&gt;.&lt;/p&gt;
+    tells Google the IP address</em></ins></span> and the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>page that was visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
-    of other people's phone numbers or email addresses).  This 
violates</em></ins></span>
-    the
-      <span class="removed"><del><strong>transmission 
reports</strong></del></span> <span class="inserted"><ins><em>privacy of those 
other people.&lt;/p&gt;
+    &lt;p&gt;Many web sites try</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>collect users' 
address books (the user's list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201110040"&gt;
@@ -3687,18 +3685,19 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into</em></ins></span> a 
<span class="removed"><del><strong>404 error really means 
nothing;</strong></del></span>
-    <span class="inserted"><ins><em>form but not sent&lt;/a&gt;, in order to 
learn their identity. Some are &lt;a
+    to snoop on information</em></ins></span> that <span 
class="inserted"><ins><em>users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span class="removed"><del><strong>server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>same sort of
+    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>same sort of
     malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before</em></ins></span> it <span 
class="inserted"><ins><em>is posted&lt;/a&gt;.&lt;/p&gt;
+    read what</em></ins></span> the <span class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>user is typing before</em></ins></span> it <span 
class="inserted"><ins><em>is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807190"&gt;
@@ -3873,9 +3872,9 @@
     nonfree, so they can't verify what it really does. The only remedy is
     to persuade school officials</em></ins></span> to <span 
class="removed"><del><strong>Google by using
       the Google Analytics service, which</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google the IP address</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+      tells Google</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
     exclusively use free software&lt;/a&gt; for both education and school
-    administration. If the school is run locally, parents</em></ins></span> 
and <span class="inserted"><ins><em>teachers
+    administration. If</em></ins></span> the <span 
class="removed"><del><strong>IP address</strong></del></span> <span 
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and 
<span class="inserted"><ins><em>teachers
     can mandate their representatives at</em></ins></span> the <span 
class="removed"><del><strong>page that was visited.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3957,7 +3956,7 @@
       cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and 
activists.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -4154,7 +4153,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/15 14:32:28 $
+$Date: 2021/04/15 19:01:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- proprietary-surveillance.ja.po      15 Apr 2021 14:32:28 -0000      1.383
+++ proprietary-surveillance.ja.po      15 Apr 2021 19:01:23 -0000      1.384
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4378,7 +4378,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary-surveillance.pot        15 Apr 2021 14:32:28 -0000      1.322
+++ proprietary-surveillance.pot        15 Apr 2021 19:01:23 -0000      1.323
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3554,7 +3554,7 @@
 "Google <a "
 
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
 "over personal data of Indian protesters and activists to Indian police</a> "
-"which leaded to their arrest. The cops requested the IP address and the "
+"which led to their arrest. The cops requested the IP address and the "
 "location where a document was created and with that information, they "
 "identified protesters and activists."
 msgstr ""

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.706
retrieving revision 1.707
diff -u -b -r1.706 -r1.707
--- proprietary-surveillance.ru.po      15 Apr 2021 16:29:55 -0000      1.706
+++ proprietary-surveillance.ru.po      15 Apr 2021 19:01:23 -0000      1.707
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5254,11 +5255,25 @@
 "\">#SpywareInNetworks</a>)</span>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary.de-diff.html    11 Apr 2021 15:04:19 -0000      1.245
+++ proprietary.de-diff.html    15 Apr 2021 19:01:23 -0000      1.246
@@ -230,7 +230,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -356,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary.de.po   11 Apr 2021 15:04:19 -0000      1.280
+++ proprietary.de.po   15 Apr 2021 19:01:23 -0000      1.281
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -483,7 +483,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.428
retrieving revision 1.429
diff -u -b -r1.428 -r1.429
--- proprietary.es.po   12 Apr 2021 10:33:24 -0000      1.428
+++ proprietary.es.po   15 Apr 2021 19:01:23 -0000      1.429
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -340,11 +341,25 @@
 msgstr "Añadidos recientes"
 
 #. type: Content of: <div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- proprietary.fr.po   12 Apr 2021 09:50:40 -0000      1.470
+++ proprietary.fr.po   15 Apr 2021 19:01:23 -0000      1.471
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-12 11:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -337,11 +338,25 @@
 msgstr "Ajouts récents"
 
 #. type: Content of: <div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary.it-diff.html    11 Apr 2021 15:04:19 -0000      1.257
+++ proprietary.it-diff.html    15 Apr 2021 19:01:23 -0000      1.258
@@ -229,7 +229,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -355,7 +355,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.it.po   11 Apr 2021 15:04:19 -0000      1.289
+++ proprietary.it.po   15 Apr 2021 19:01:23 -0000      1.290
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -488,7 +488,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary.ja-diff.html    11 Apr 2021 15:04:19 -0000      1.262
+++ proprietary.ja-diff.html    15 Apr 2021 19:01:24 -0000      1.263
@@ -234,7 +234,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -360,7 +360,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.ja.po   11 Apr 2021 15:04:19 -0000      1.273
+++ proprietary.ja.po   15 Apr 2021 19:01:24 -0000      1.274
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -346,7 +346,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- proprietary.nl-diff.html    11 Apr 2021 15:04:19 -0000      1.258
+++ proprietary.nl-diff.html    15 Apr 2021 19:01:24 -0000      1.259
@@ -229,7 +229,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -355,7 +355,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.nl.po   11 Apr 2021 15:04:19 -0000      1.263
+++ proprietary.nl.po   15 Apr 2021 19:01:24 -0000      1.264
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -391,7 +391,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary.pl-diff.html    11 Apr 2021 15:04:19 -0000      1.275
+++ proprietary.pl-diff.html    15 Apr 2021 19:01:24 -0000      1.276
@@ -228,7 +228,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -354,7 +354,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary.pl.po   11 Apr 2021 15:04:19 -0000      1.256
+++ proprietary.pl.po   15 Apr 2021 19:01:24 -0000      1.257
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -572,7 +572,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary.pot     11 Apr 2021 15:04:19 -0000      1.253
+++ proprietary.pot     15 Apr 2021 19:01:24 -0000      1.254
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -283,7 +283,7 @@
 "Google <a "
 
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
 "over personal data of Indian protesters and activists to Indian police</a> "
-"which leaded to their arrest. The cops requested the IP address and the "
+"which led to their arrest. The cops requested the IP address and the "
 "location where a document was created and with that information, they "
 "identified protesters and activists."
 msgstr ""

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- proprietary.pt-br.po        11 Apr 2021 15:04:19 -0000      1.405
+++ proprietary.pt-br.po        15 Apr 2021 19:01:24 -0000      1.406
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-02-07 15:33-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -344,7 +344,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.492
retrieving revision 1.493
diff -u -b -r1.492 -r1.493
--- proprietary.ru.po   12 Apr 2021 08:04:25 -0000      1.492
+++ proprietary.ru.po   15 Apr 2021 19:01:24 -0000      1.493
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -339,11 +340,25 @@
 msgstr "Последние добавления"
 
 #. type: Content of: <div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.tr.po   14 Apr 2021 18:15:50 -0000      1.146
+++ proprietary.tr.po   15 Apr 2021 19:01:24 -0000      1.147
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-14 20:13+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -335,11 +336,19 @@
 msgstr "Son eklenenler"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.zh-cn.po        13 Apr 2021 05:59:43 -0000      1.185
+++ proprietary.zh-cn.po        15 Apr 2021 19:01:24 -0000      1.186
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2021-04-13 13:40+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -314,11 +315,19 @@
 msgstr "最新添加"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary.zh-tw-diff.html 11 Apr 2021 15:04:20 -0000      1.238
+++ proprietary.zh-tw-diff.html 15 Apr 2021 19:01:24 -0000      1.239
@@ -230,7 +230,7 @@
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
     over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt; which leaded to their arrest. The cops requested the IP
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
   &lt;/li&gt;
@@ -356,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/11 15:04:20 $
+$Date: 2021/04/15 19:01:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- proprietary.zh-tw.po        11 Apr 2021 15:04:20 -0000      1.243
+++ proprietary.zh-tw.po        15 Apr 2021 19:01:24 -0000      1.244
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -461,7 +461,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.374
retrieving revision 1.375
diff -u -b -r1.374 -r1.375
--- pt-br.po    15 Apr 2021 14:32:30 -0000      1.374
+++ pt-br.po    15 Apr 2021 19:01:24 -0000      1.375
@@ -4448,7 +4448,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.632
retrieving revision 1.633
diff -u -b -r1.632 -r1.633
--- ru.po       15 Apr 2021 16:19:06 -0000      1.632
+++ ru.po       15 Apr 2021 19:01:24 -0000      1.633
@@ -5357,11 +5357,25 @@
 "отнюдь не по умолчанию.)"
 
 #. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""
@@ -11817,9 +11831,9 @@
 "be more aware that they are installing spyware."
 msgstr ""
 "Есть сходный сайт под названием <a 
href=\"https://spyware.neocities.org";
-"\">Сторож шпионских программ</a>, на котором 
классифицируются программы-шпионы, "
-"чтобы пользователи могли быть более 
осведомлены о том, что они устанавливают "
-"программы-шпионы."
+"\">Сторож шпионских программ</a>, на котором 
классифицируются программы-"
+"шпионы, чтобы пользователи могли быть 
более осведомлены о том, что они "
+"устанавливают программы-шпионы."
 
 #. type: Content of: <div><div><div><h3>
 msgid "Table of Contents"
@@ -13091,6 +13105,21 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">передала индийской 
полиции персональные данные "
+#~ "участников протестов и активистов 
Индии</a>, что привело к их аресту. "
+#~ "Полицейские затребовали адреса IP и 
место создания документа, а с помощью "
+#~ "этой информации они идентифицировали 
участников протестов и активистов."
+
+#~ msgid ""
 #~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 #~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
 #~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- tr.po       15 Apr 2021 14:32:30 -0000      1.167
+++ tr.po       15 Apr 2021 19:01:24 -0000      1.168
@@ -3947,11 +3947,19 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""
@@ -10045,6 +10053,22 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">Hindistan'daki protestocuların kişisel "
+#~ "verilerini Hindistan polisine teslim etti</a>, bu da tutuklanmalarına yol 
"
+#~ "açtı. Polisler bir belgenin oluşturulduğu konumu ve IP adresini talep "
+#~ "ettiler ve bu bilgiyi kullanarak protestocuları ve aktivistleri "
+#~ "belirlediler."
+
+#~ msgid ""
 #~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 #~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
 #~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- zh-cn.po    15 Apr 2021 14:32:30 -0000      1.168
+++ zh-cn.po    15 Apr 2021 19:01:25 -0000      1.169
@@ -3891,11 +3891,19 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""
@@ -9771,6 +9779,20 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
 
 #~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">把印度抗议者
和活动家的个人信息拱手交给印度警方"
+#~ "</a>,导致这些人士被捕。警察要求提供文档创建时的 IP 
地址和位置信息,并据此"
+#~ "确认抗议者和活动家。"
+
+#~ msgid ""
 #~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/";
 #~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
 #~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- zh-tw.po    15 Apr 2021 14:32:30 -0000      1.303
+++ zh-tw.po    15 Apr 2021 19:01:25 -0000      1.304
@@ -3823,7 +3823,7 @@
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
 "requested the IP address and the location where a document was created and "
 "with that information, they identified protesters and activists."
 msgstr ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]